use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.
the class RegisterTests method getRegisterWithName_TestDataAsListOfLists.
protected List<List<Object>> getRegisterWithName_TestDataAsListOfLists() {
List<List<Object>> ll = new ArrayList<List<Object>>();
if (clienttasks == null)
return ll;
// bugzilla 672233
String invalidNameStderr = "System name must consist of only alphanumeric characters, periods, dashes and underscores.";
// bugzilla 677405
invalidNameStderr = "System name cannot contain most special characters.";
String maxCharsStdout = null;
String maxCharsStderr = "Name of the consumer should be shorter than 250 characters\\.";
if (!clienttasks.workaroundForBug876764(sm_serverType))
maxCharsStderr = "Name of the unit must be shorter than 250 characters\\.";
// Problem creating unit Consumer [id = 8a9087e3462af2aa01466361ec71037f, type = ConsumerType [id=1000, label=system], getName() = 256_characters_6789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456] // valid after bug https://bugzilla.redhat.com/show_bug.cgi?id=1094492#c1
maxCharsStderr = "Problem creating unit Consumer";
if (SubscriptionManagerTasks.isVersion(servertasks.statusVersion, ">=", "2.0.21-1")) {
// Bug 1371009 - Need clearer error message when register with system name exceeding max characters.
// candlepin commit 606b9d9d14d1547d9704e6151f873573f68c52b8 1371009: Need clearer error message when register with system name exceeding max characters.
maxCharsStderr = "Name of the consumer should be shorter than 255 characters\\.";
// candlepin commit 4e365796eeeea75ad1fc2d35ab4222e0604f1eca 1371009: clearer error message (fixed typo)
maxCharsStderr = "Name of the consumer should be shorter than 256 characters\\.";
}
String name;
// msg changed by bug 878634
String successfulStdout = "The system has been registered with id: [a-f,0-9,\\-]{36}";
successfulStdout = "The system has been registered with ID: [a-f,0-9,\\-]{36}";
// valid names according to bugzilla 672233
name = "periods...dashes---underscores___alphanumerics123";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
null }));
name = "249_characters_678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
null }));
// changed from 249 to 255 chars by candlepin commit a0db7c35f8d7ee71daeabaf39788b3f47206e0e0; 1065369: Use Hibernate Validation to supersede database error reporting.
name = "255_characters_678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345";
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "672233", "1065369", "1094492", "1451107" }), name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
null }));
// the tolerable characters has increased due to bugzilla 677405 and agilo task http://gibson.usersys.redhat.com/agilo/ticket/5235 (6.1) As an IT Person, I would like to ensure that user service and candlepin enforce the same valid character rules (QE); Developer beav "Christopher Duryee" <cduryee@redhat.com>
// https://bugzilla.redhat.com/show_bug.cgi?id=677405#c1
name = "[openingBracket[";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\[openingBracket\\["*/
null }));
name = "]closingBracket]";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\]closingBracket\\]"*/
null }));
name = "{openingBrace{";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\{openingBrace\\{"*/
null }));
name = "}closingBrace}";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\}closingBrace\\}"*/
null }));
name = "(openingParenthesis(";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\(openingParenthesis\\("*/
null }));
name = ")closingParenthesis)";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\)closingParenthesis\\)"*/
null }));
name = "?questionMark?";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\?questionMark\\?"*/
null }));
name = "@at@";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
null }));
name = "!exclamationPoint!";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
null }));
name = "`backTick`";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
null }));
name = "'singleQuote'";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
null }));
// Note: pound signs within the name are acceptable, but not at the beginning
name = "pound#sign";
// Note: pound signs within the name are acceptable, but not at the beginning
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
null }));
// invalid names
// Note: IT Services invalid characters can be tested by trying to Sign Up a new login here: https://www.webqa.redhat.com/wapps/sso/login.html
// Invalid Chars: (") ($) (^) (<) (>) (|) (+) (%) (/) (;) (:) (,) (\) (*) (=) (~) // from https://bugzilla.redhat.com/show_bug.cgi?id=677405#c1
name = "\"doubleQuotes\"";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = "$dollarSign$";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = "^caret^";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = "<lessThan<";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = ">greaterThan>";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = "|verticalBar|";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = "+plus+";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = "%percent%";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = "/slash/";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = ";semicolon;";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = ":colon:";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = ",comma,";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = "\\backslash\\";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = "*asterisk*";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = "=equal=";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
name = "~tilde~";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
// spaces are also rejected characters from IT Services
name = "s p a c e s";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
// special case (pound sign at the beginning is a limitation in the x509 certificates)
name = "#poundSign";
ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, "System name cannot begin with # character" }));
//
// http://www.ascii.cl/htmlcodes.htm
// TODO
// name = "é"; ll.add(Arrays.asList(new Object[]{ name, Integer.valueOf(255), null, invalidNameStderr}));
// name = "ë"; ll.add(Arrays.asList(new Object[]{ name, Integer.valueOf(255), null, invalidNameStderr}));
// name = "â"; ll.add(Arrays.asList(new Object[]{ name, Integer.valueOf(255), null, invalidNameStderr}));
// names that are too long
name = "250_characters_6789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890";
// changed from 250 to 256 chars by candlepin commit a0db7c35f8d7ee71daeabaf39788b3f47206e0e0; 1065369: Use Hibernate Validation to supersede database error reporting.
// ll.add(Arrays.asList(new Object[] {new BlockedByBzBug("672233"), name, Integer.valueOf(255), null, maxCharsStderr}));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("672233"), name, Integer.valueOf(0), successfulStdout, null }));
name = "256_characters_6789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456";
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "672233", "1065369", "1094492", "1101552" }), name, Integer.valueOf(255), maxCharsStdout, maxCharsStderr }));
// for all rows, change the expected exitCode when testing post subscription-manager-1.13.8-1
if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.13.8-1")) {
// post commit df95529a5edd0be456b3528b74344be283c4d258 bug 1119688
for (List<Object> l : ll) {
// get the existing BlockedByBzBug
BlockedByBzBug blockedByBzBug = (BlockedByBzBug) l.get(0);
Integer expectedExitCode = (Integer) l.get(2);
if (expectedExitCode.equals(255)) {
List<String> bugIds = blockedByBzBug == null ? new ArrayList<String>() : new ArrayList<String>(Arrays.asList(blockedByBzBug.getBugIds()));
// Bug 1119688 - [RFE] subscription-manager better usability for scripts
bugIds.add("1119688");
blockedByBzBug = new BlockedByBzBug(bugIds.toArray(new String[] {}));
l.set(0, blockedByBzBug);
// EX_SOFTWARE
l.set(2, new Integer(70));
}
}
}
return ll;
}
use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.
the class RegisterTests method getRegisterWithBaseurl_TestDataAsListOfLists.
protected List<List<Object>> getRegisterWithBaseurl_TestDataAsListOfLists() {
List<List<Object>> ll = new ArrayList<List<Object>>();
if (!isSetupBeforeSuiteComplete)
return ll;
if (servertasks == null)
return ll;
if (clienttasks == null)
return ll;
String defaultHostname = "cdn.redhat.com";
// --baseurl=BASE_URL base url for content in form of https://hostname:443/prefix
// Object bugzilla, String baseurl, String baseurlConfigured, Integer expectedExitCode, String expectedStdoutRegex, String expectedStderrRegex
// positive tests
ll.add(Arrays.asList(new Object[] { null, "https://myhost.example.com:900/myapp/", "https://myhost.example.com:900/myapp/", new Integer(0), null, null }));
// 842830 CLOSED WONTFIX ll.add(Arrays.asList(new Object[] {new BlockedByBzBug("842830"), "http://myhost.example.com:900/myapp/", "http://myhost.example.com:900/myapp/", new Integer(0), null, null}));
ll.add(Arrays.asList(new Object[] { null, "https://https:900/myapp/", "https://https:900/myapp/", new Integer(0), null, null }));
ll.add(Arrays.asList(new Object[] { null, "https://http:900/myapp/", "https://http:900/myapp/", new Integer(0), null, null }));
// 842830 CLOSED WONTFIX ll.add(Arrays.asList(new Object[] {new BlockedByBzBug("842830"), "http://http:900/myapp/", "http://http:900/myapp/", new Integer(0), null, null}));
ll.add(Arrays.asList(new Object[] { null, "myhost.example.com:900/myapp/", "https://myhost.example.com:900/myapp/", new Integer(0), null, null }));
ll.add(Arrays.asList(new Object[] { null, "myhost.example.com:900/myapp", "https://myhost.example.com:900/myapp", new Integer(0), null, null }));
ll.add(Arrays.asList(new Object[] { null, "myhost.example.com:900/", /*"https://myhost.example.com:900/"*/
"https://myhost.example.com:900", new Integer(0), null, null }));
ll.add(Arrays.asList(new Object[] { null, "myhost.example.com:900", "https://myhost.example.com:900", new Integer(0), null, null }));
ll.add(Arrays.asList(new Object[] { null, "myhost.example.com/", /*"https://myhost.example.com/"*/
"https://myhost.example.com", new Integer(0), null, null }));
ll.add(Arrays.asList(new Object[] { null, "myhost.example.com/myapp", "https://myhost.example.com/myapp", new Integer(0), null, null }));
ll.add(Arrays.asList(new Object[] { null, "myhost.example.com/myapp/", "https://myhost.example.com/myapp/", new Integer(0), null, null }));
ll.add(Arrays.asList(new Object[] { null, "myhost.example.com", "https://myhost.example.com", new Integer(0), null, null }));
ll.add(Arrays.asList(new Object[] { null, "myhost-examp_e.com", "https://myhost-examp_e.com", new Integer(0), null, null }));
ll.add(Arrays.asList(new Object[] { null, "myhost", "https://myhost", new Integer(0), null, null }));
ll.add(Arrays.asList(new Object[] { null, "/myapp", "https://" + defaultHostname + "/myapp", new Integer(0), null, null }));
ll.add(Arrays.asList(new Object[] { null, ":900/myapp", "https://" + defaultHostname + ":900/myapp", new Integer(0), null, null }));
// ignored tests
ll.add(Arrays.asList(new Object[] { null, "", /*ll.get(ll.size()-1).get(2) last set, assuming the last test row passes */
null, new Integer(0), null, null }));
// negative tests
if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.13.9-1")) {
// post commit a695ef2d1da882c5f851fde90a24f957b70a63ad
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496", "878634" }), "https://hostname:/prefix", null, new Integer(70), "Error parsing baseurl:", "Server URL port should be numeric" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496", "878634", "842845" }), "https://hostname:PORT/prefix", null, new Integer(70), "Error parsing baseurl:", "Server URL port should be numeric" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "https:/hostname", null, new Integer(70), "Error parsing baseurl:", "Server URL has an invalid scheme. http:// and https:// are supported" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "https:hostname/prefix", null, new Integer(70), "Error parsing baseurl:", "Server URL has an invalid scheme. http:// and https:// are supported" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "http//hostname/prefix", null, new Integer(70), "Error parsing baseurl:", "Server URL has an invalid scheme. http:// and https:// are supported" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "http/hostname/prefix", null, new Integer(70), "Error parsing baseurl:", "Server URL has an invalid scheme. http:// and https:// are supported" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "ftp://hostname", null, new Integer(70), "Error parsing baseurl:", "Server URL has an invalid scheme. http:// and https:// are supported" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "git://hostname/prefix", null, new Integer(70), "Error parsing baseurl:", "Server URL has an invalid scheme. http:// and https:// are supported" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "https://", null, new Integer(70), "Error parsing baseurl:", "Server URL is just a schema. Should include hostname, and/or port and path" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "http://", null, new Integer(70), "Error parsing baseurl:", "Server URL is just a schema. Should include hostname, and/or port and path" }));
// ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[]{"1119688","1044686","1054496"}), TODO "DON'T KNOW WHAT TO PUT HERE TO INVOKE THE ERROR; see exceptions.py", null, new Integer(70), "Error parsing baseurl:\nServer URL can not be empty", null}));
// ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[]{"1119688","1044686","1054496"}), TODO "DON'T KNOW WHAT TO PUT HERE TO INVOKE THE ERROR; see exceptions.py", null, new Integer(70), "Error parsing baseurl:\nServer URL can not be None", null}));
} else if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.10.12-1")) {
// "Error parsing baseurl:\nServer URL port could not be parsed", null}));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496", "878634" }), "https://hostname:/prefix", null, new Integer(255), "Error parsing baseurl:\nServer URL port should be numeric", null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496", "878634", "842845" }), "https://hostname:PORT/prefix", null, new Integer(255), "Error parsing baseurl:\nServer URL port should be numeric", null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "https:/hostname", null, new Integer(255), "Error parsing baseurl:\nServer URL has an invalid scheme. http:// and https:// are supported", null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "https:hostname/prefix", null, new Integer(255), "Error parsing baseurl:\nServer URL has an invalid scheme. http:// and https:// are supported", null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "http//hostname/prefix", null, new Integer(255), "Error parsing baseurl:\nServer URL has an invalid scheme. http:// and https:// are supported", null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "http/hostname/prefix", null, new Integer(255), "Error parsing baseurl:\nServer URL has an invalid scheme. http:// and https:// are supported", null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "ftp://hostname", null, new Integer(255), "Error parsing baseurl:\nServer URL has an invalid scheme. http:// and https:// are supported", null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "git://hostname/prefix", null, new Integer(255), "Error parsing baseurl:\nServer URL has an invalid scheme. http:// and https:// are supported", null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "https://", null, new Integer(255), "Error parsing baseurl:\nServer URL is just a schema. Should include hostname, and/or port and path", null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "http://", null, new Integer(255), "Error parsing baseurl:\nServer URL is just a schema. Should include hostname, and/or port and path", null }));
// ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[]{"1044686","1054496"}), TODO "DON'T KNOW WHAT TO PUT HERE TO INVOKE THE ERROR; see exceptions.py", null, new Integer(255), "Error parsing baseurl:\nServer URL can not be empty", null}));
// ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[]{"1044686","1054496"}), TODO "DON'T KNOW WHAT TO PUT HERE TO INVOKE THE ERROR; see exceptions.py", null, new Integer(255), "Error parsing baseurl:\nServer URL can not be None", null}));
} else {
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "878634" }), "https://hostname:/prefix", null, new Integer(255), "Error parsing baseurl: Server URL port could not be parsed", null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "878634", "842845" }), "https://hostname:PORT/prefix", null, new Integer(255), "Error parsing baseurl: Server URL port should be numeric", null }));
ll.add(Arrays.asList(new Object[] { null, "https:/hostname", null, new Integer(255), "Error parsing baseurl: Server URL has an invalid scheme. http:// and https:// are supported", null }));
ll.add(Arrays.asList(new Object[] { null, "https:hostname/prefix", null, new Integer(255), "Error parsing baseurl: Server URL has an invalid scheme. http:// and https:// are supported", null }));
ll.add(Arrays.asList(new Object[] { null, "http//hostname/prefix", null, new Integer(255), "Error parsing baseurl: Server URL has an invalid scheme. http:// and https:// are supported", null }));
ll.add(Arrays.asList(new Object[] { null, "http/hostname/prefix", null, new Integer(255), "Error parsing baseurl: Server URL has an invalid scheme. http:// and https:// are supported", null }));
ll.add(Arrays.asList(new Object[] { null, "ftp://hostname", null, new Integer(255), "Error parsing baseurl: Server URL has an invalid scheme. http:// and https:// are supported", null }));
ll.add(Arrays.asList(new Object[] { null, "git://hostname/prefix", null, new Integer(255), "Error parsing baseurl: Server URL has an invalid scheme. http:// and https:// are supported", null }));
ll.add(Arrays.asList(new Object[] { null, "https://", null, new Integer(255), "Error parsing baseurl: Server URL is just a schema. Should include hostname, and/or port and path", null }));
ll.add(Arrays.asList(new Object[] { null, "http://", null, new Integer(255), "Error parsing baseurl: Server URL is just a schema. Should include hostname, and/or port and path", null }));
}
// for all rows, change the expected exitCode when testing post subscription-manager-1.13.8-1
if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.13.8-1")) {
// post commit df95529a5edd0be456b3528b74344be283c4d258 bug 1119688
for (List<Object> l : ll) {
// Object bugzilla, String baseurl, String baseurlConfigured, Integer expectedExitCode, String expectedStdoutRegex, String expectedStderrRegex
Integer expectedExitCode = (Integer) l.get(3);
if (expectedExitCode.equals(255)) {
// get the existing BlockedByBzBug
BlockedByBzBug blockedByBzBug = (BlockedByBzBug) l.get(0);
List<String> bugIds = blockedByBzBug == null ? new ArrayList<String>() : new ArrayList<String>(Arrays.asList(blockedByBzBug.getBugIds()));
// Bug 1119688 - [RFE] subscription-manager better usability for scripts
bugIds.add("1119688");
blockedByBzBug = new BlockedByBzBug(bugIds.toArray(new String[] {}));
l.set(0, blockedByBzBug);
// EX_SOFTWARE
l.set(3, new Integer(70));
}
}
}
return ll;
}
Aggregations