Search in sources :

Example 66 with BlockedByBzBug

use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.

the class RegisterTests method getRegisterWithName_TestDataAsListOfLists.

protected List<List<Object>> getRegisterWithName_TestDataAsListOfLists() {
    List<List<Object>> ll = new ArrayList<List<Object>>();
    if (clienttasks == null)
        return ll;
    // bugzilla 672233
    String invalidNameStderr = "System name must consist of only alphanumeric characters, periods, dashes and underscores.";
    // bugzilla 677405
    invalidNameStderr = "System name cannot contain most special characters.";
    String maxCharsStdout = null;
    String maxCharsStderr = "Name of the consumer should be shorter than 250 characters\\.";
    if (!clienttasks.workaroundForBug876764(sm_serverType))
        maxCharsStderr = "Name of the unit must be shorter than 250 characters\\.";
    // Problem creating unit Consumer [id = 8a9087e3462af2aa01466361ec71037f, type = ConsumerType [id=1000, label=system], getName() = 256_characters_6789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456]	// valid after bug https://bugzilla.redhat.com/show_bug.cgi?id=1094492#c1
    maxCharsStderr = "Problem creating unit Consumer";
    if (SubscriptionManagerTasks.isVersion(servertasks.statusVersion, ">=", "2.0.21-1")) {
        // Bug 1371009 - Need clearer error message when register with system name exceeding max characters.
        // candlepin commit 606b9d9d14d1547d9704e6151f873573f68c52b8 1371009:  Need clearer error message when register with system name exceeding max characters.
        maxCharsStderr = "Name of the consumer should be shorter than 255 characters\\.";
        // candlepin commit 4e365796eeeea75ad1fc2d35ab4222e0604f1eca 1371009: clearer error message (fixed typo)
        maxCharsStderr = "Name of the consumer should be shorter than 256 characters\\.";
    }
    String name;
    // msg changed by bug 878634
    String successfulStdout = "The system has been registered with id: [a-f,0-9,\\-]{36}";
    successfulStdout = "The system has been registered with ID: [a-f,0-9,\\-]{36}";
    // valid names according to bugzilla 672233
    name = "periods...dashes---underscores___alphanumerics123";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
    null }));
    name = "249_characters_678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
    null }));
    // changed from 249 to 255 chars by candlepin commit a0db7c35f8d7ee71daeabaf39788b3f47206e0e0; 1065369: Use Hibernate Validation to supersede database error reporting.
    name = "255_characters_678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345";
    ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "672233", "1065369", "1094492", "1451107" }), name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
    null }));
    // the tolerable characters has increased due to bugzilla 677405 and agilo task http://gibson.usersys.redhat.com/agilo/ticket/5235 (6.1) As an IT Person, I would like to ensure that user service and candlepin enforce the same valid character rules (QE); Developer beav "Christopher Duryee" <cduryee@redhat.com>
    // https://bugzilla.redhat.com/show_bug.cgi?id=677405#c1
    name = "[openingBracket[";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\[openingBracket\\["*/
    null }));
    name = "]closingBracket]";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\]closingBracket\\]"*/
    null }));
    name = "{openingBrace{";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\{openingBrace\\{"*/
    null }));
    name = "}closingBrace}";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\}closingBrace\\}"*/
    null }));
    name = "(openingParenthesis(";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\(openingParenthesis\\("*/
    null }));
    name = ")closingParenthesis)";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\)closingParenthesis\\)"*/
    null }));
    name = "?questionMark?";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} \\?questionMark\\?"*/
    null }));
    name = "@at@";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
    null }));
    name = "!exclamationPoint!";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
    null }));
    name = "`backTick`";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
    null }));
    name = "'singleQuote'";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
    null }));
    // Note: pound signs within the name are acceptable, but not at the beginning
    name = "pound#sign";
    // Note: pound signs within the name are acceptable, but not at the beginning
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(0), successfulStdout, /*"[a-f,0-9,\\-]{36} "+name*/
    null }));
    // invalid names
    // Note: IT Services invalid characters can be tested by trying to Sign Up a new login here: https://www.webqa.redhat.com/wapps/sso/login.html
    // Invalid Chars: (") ($) (^) (<) (>) (|) (+) (%) (/) (;) (:) (,) (\) (*) (=) (~)  // from https://bugzilla.redhat.com/show_bug.cgi?id=677405#c1
    name = "\"doubleQuotes\"";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = "$dollarSign$";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = "^caret^";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = "<lessThan<";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = ">greaterThan>";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = "|verticalBar|";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = "+plus+";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = "%percent%";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = "/slash/";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = ";semicolon;";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = ":colon:";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = ",comma,";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = "\\backslash\\";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = "*asterisk*";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = "=equal=";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    name = "~tilde~";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    // spaces are also rejected characters from IT Services
    name = "s p a c e s";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, invalidNameStderr }));
    // special case (pound sign at the beginning is a limitation in the x509 certificates)
    name = "#poundSign";
    ll.add(Arrays.asList(new Object[] { null, name, Integer.valueOf(255), null, "System name cannot begin with # character" }));
    // 
    // http://www.ascii.cl/htmlcodes.htm
    // TODO
    // name = "é";						ll.add(Arrays.asList(new Object[]{	name,	Integer.valueOf(255),	null,	invalidNameStderr}));
    // name = "ë";						ll.add(Arrays.asList(new Object[]{	name,	Integer.valueOf(255),	null,	invalidNameStderr}));
    // name = "â";						ll.add(Arrays.asList(new Object[]{	name,	Integer.valueOf(255),	null,	invalidNameStderr}));
    // names that are too long
    name = "250_characters_6789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890";
    // changed from 250 to 256 chars by candlepin commit a0db7c35f8d7ee71daeabaf39788b3f47206e0e0; 1065369: Use Hibernate Validation to supersede database error reporting.
    // ll.add(Arrays.asList(new Object[] {new BlockedByBzBug("672233"),	name,	Integer.valueOf(255),	null,				maxCharsStderr}));
    ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("672233"), name, Integer.valueOf(0), successfulStdout, null }));
    name = "256_characters_6789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456";
    ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "672233", "1065369", "1094492", "1101552" }), name, Integer.valueOf(255), maxCharsStdout, maxCharsStderr }));
    // for all rows, change the expected exitCode when testing post subscription-manager-1.13.8-1
    if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.13.8-1")) {
        // post commit df95529a5edd0be456b3528b74344be283c4d258 bug 1119688
        for (List<Object> l : ll) {
            // get the existing BlockedByBzBug
            BlockedByBzBug blockedByBzBug = (BlockedByBzBug) l.get(0);
            Integer expectedExitCode = (Integer) l.get(2);
            if (expectedExitCode.equals(255)) {
                List<String> bugIds = blockedByBzBug == null ? new ArrayList<String>() : new ArrayList<String>(Arrays.asList(blockedByBzBug.getBugIds()));
                // Bug 1119688 - [RFE] subscription-manager better usability for scripts
                bugIds.add("1119688");
                blockedByBzBug = new BlockedByBzBug(bugIds.toArray(new String[] {}));
                l.set(0, blockedByBzBug);
                // EX_SOFTWARE
                l.set(2, new Integer(70));
            }
        }
    }
    return ll;
}
Also used : ArrayList(java.util.ArrayList) ArrayList(java.util.ArrayList) List(java.util.List) JSONObject(org.json.JSONObject) BlockedByBzBug(com.redhat.qe.auto.bugzilla.BlockedByBzBug)

Example 67 with BlockedByBzBug

use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.

the class RegisterTests method getRegisterWithBaseurl_TestDataAsListOfLists.

protected List<List<Object>> getRegisterWithBaseurl_TestDataAsListOfLists() {
    List<List<Object>> ll = new ArrayList<List<Object>>();
    if (!isSetupBeforeSuiteComplete)
        return ll;
    if (servertasks == null)
        return ll;
    if (clienttasks == null)
        return ll;
    String defaultHostname = "cdn.redhat.com";
    // --baseurl=BASE_URL    base url for content in form of https://hostname:443/prefix
    // Object bugzilla, String baseurl, String baseurlConfigured, Integer expectedExitCode, String expectedStdoutRegex, String expectedStderrRegex
    // positive tests
    ll.add(Arrays.asList(new Object[] { null, "https://myhost.example.com:900/myapp/", "https://myhost.example.com:900/myapp/", new Integer(0), null, null }));
    // 842830 CLOSED WONTFIX ll.add(Arrays.asList(new Object[] {new BlockedByBzBug("842830"),	"http://myhost.example.com:900/myapp/",		"http://myhost.example.com:900/myapp/",		new Integer(0),		null,			null}));
    ll.add(Arrays.asList(new Object[] { null, "https://https:900/myapp/", "https://https:900/myapp/", new Integer(0), null, null }));
    ll.add(Arrays.asList(new Object[] { null, "https://http:900/myapp/", "https://http:900/myapp/", new Integer(0), null, null }));
    // 842830 CLOSED WONTFIX ll.add(Arrays.asList(new Object[] {new BlockedByBzBug("842830"),	"http://http:900/myapp/",					"http://http:900/myapp/",					new Integer(0),		null,			null}));
    ll.add(Arrays.asList(new Object[] { null, "myhost.example.com:900/myapp/", "https://myhost.example.com:900/myapp/", new Integer(0), null, null }));
    ll.add(Arrays.asList(new Object[] { null, "myhost.example.com:900/myapp", "https://myhost.example.com:900/myapp", new Integer(0), null, null }));
    ll.add(Arrays.asList(new Object[] { null, "myhost.example.com:900/", /*"https://myhost.example.com:900/"*/
    "https://myhost.example.com:900", new Integer(0), null, null }));
    ll.add(Arrays.asList(new Object[] { null, "myhost.example.com:900", "https://myhost.example.com:900", new Integer(0), null, null }));
    ll.add(Arrays.asList(new Object[] { null, "myhost.example.com/", /*"https://myhost.example.com/"*/
    "https://myhost.example.com", new Integer(0), null, null }));
    ll.add(Arrays.asList(new Object[] { null, "myhost.example.com/myapp", "https://myhost.example.com/myapp", new Integer(0), null, null }));
    ll.add(Arrays.asList(new Object[] { null, "myhost.example.com/myapp/", "https://myhost.example.com/myapp/", new Integer(0), null, null }));
    ll.add(Arrays.asList(new Object[] { null, "myhost.example.com", "https://myhost.example.com", new Integer(0), null, null }));
    ll.add(Arrays.asList(new Object[] { null, "myhost-examp_e.com", "https://myhost-examp_e.com", new Integer(0), null, null }));
    ll.add(Arrays.asList(new Object[] { null, "myhost", "https://myhost", new Integer(0), null, null }));
    ll.add(Arrays.asList(new Object[] { null, "/myapp", "https://" + defaultHostname + "/myapp", new Integer(0), null, null }));
    ll.add(Arrays.asList(new Object[] { null, ":900/myapp", "https://" + defaultHostname + ":900/myapp", new Integer(0), null, null }));
    // ignored tests
    ll.add(Arrays.asList(new Object[] { null, "", /*ll.get(ll.size()-1).get(2) last set, assuming the last test row passes */
    null, new Integer(0), null, null }));
    // negative tests
    if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.13.9-1")) {
        // post commit a695ef2d1da882c5f851fde90a24f957b70a63ad
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496", "878634" }), "https://hostname:/prefix", null, new Integer(70), "Error parsing baseurl:", "Server URL port should be numeric" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496", "878634", "842845" }), "https://hostname:PORT/prefix", null, new Integer(70), "Error parsing baseurl:", "Server URL port should be numeric" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "https:/hostname", null, new Integer(70), "Error parsing baseurl:", "Server URL has an invalid scheme. http:// and https:// are supported" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "https:hostname/prefix", null, new Integer(70), "Error parsing baseurl:", "Server URL has an invalid scheme. http:// and https:// are supported" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "http//hostname/prefix", null, new Integer(70), "Error parsing baseurl:", "Server URL has an invalid scheme. http:// and https:// are supported" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "http/hostname/prefix", null, new Integer(70), "Error parsing baseurl:", "Server URL has an invalid scheme. http:// and https:// are supported" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "ftp://hostname", null, new Integer(70), "Error parsing baseurl:", "Server URL has an invalid scheme. http:// and https:// are supported" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "git://hostname/prefix", null, new Integer(70), "Error parsing baseurl:", "Server URL has an invalid scheme. http:// and https:// are supported" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "https://", null, new Integer(70), "Error parsing baseurl:", "Server URL is just a schema. Should include hostname, and/or port and path" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "1044686", "1054496" }), "http://", null, new Integer(70), "Error parsing baseurl:", "Server URL is just a schema. Should include hostname, and/or port and path" }));
    // ll.add(Arrays.asList(new Object[] {	new BlockedByBzBug(new String[]{"1119688","1044686","1054496"}),						TODO "DON'T KNOW WHAT TO PUT HERE TO INVOKE THE ERROR; see exceptions.py",	null,	new Integer(70),	"Error parsing baseurl:\nServer URL can not be empty",	null}));
    // ll.add(Arrays.asList(new Object[] {	new BlockedByBzBug(new String[]{"1119688","1044686","1054496"}),						TODO "DON'T KNOW WHAT TO PUT HERE TO INVOKE THE ERROR; see exceptions.py",	null,	new Integer(70),	"Error parsing baseurl:\nServer URL can not be None",	null}));
    } else if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.10.12-1")) {
        // "Error parsing baseurl:\nServer URL port could not be parsed",											null}));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496", "878634" }), "https://hostname:/prefix", null, new Integer(255), "Error parsing baseurl:\nServer URL port should be numeric", null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496", "878634", "842845" }), "https://hostname:PORT/prefix", null, new Integer(255), "Error parsing baseurl:\nServer URL port should be numeric", null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "https:/hostname", null, new Integer(255), "Error parsing baseurl:\nServer URL has an invalid scheme. http:// and https:// are supported", null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "https:hostname/prefix", null, new Integer(255), "Error parsing baseurl:\nServer URL has an invalid scheme. http:// and https:// are supported", null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "http//hostname/prefix", null, new Integer(255), "Error parsing baseurl:\nServer URL has an invalid scheme. http:// and https:// are supported", null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "http/hostname/prefix", null, new Integer(255), "Error parsing baseurl:\nServer URL has an invalid scheme. http:// and https:// are supported", null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "ftp://hostname", null, new Integer(255), "Error parsing baseurl:\nServer URL has an invalid scheme. http:// and https:// are supported", null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "git://hostname/prefix", null, new Integer(255), "Error parsing baseurl:\nServer URL has an invalid scheme. http:// and https:// are supported", null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "https://", null, new Integer(255), "Error parsing baseurl:\nServer URL is just a schema. Should include hostname, and/or port and path", null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1044686", "1054496" }), "http://", null, new Integer(255), "Error parsing baseurl:\nServer URL is just a schema. Should include hostname, and/or port and path", null }));
    // ll.add(Arrays.asList(new Object[] {	new BlockedByBzBug(new String[]{"1044686","1054496"}),						TODO "DON'T KNOW WHAT TO PUT HERE TO INVOKE THE ERROR; see exceptions.py",	null,	new Integer(255),	"Error parsing baseurl:\nServer URL can not be empty",	null}));
    // ll.add(Arrays.asList(new Object[] {	new BlockedByBzBug(new String[]{"1044686","1054496"}),						TODO "DON'T KNOW WHAT TO PUT HERE TO INVOKE THE ERROR; see exceptions.py",	null,	new Integer(255),	"Error parsing baseurl:\nServer URL can not be None",	null}));
    } else {
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "878634" }), "https://hostname:/prefix", null, new Integer(255), "Error parsing baseurl: Server URL port could not be parsed", null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "878634", "842845" }), "https://hostname:PORT/prefix", null, new Integer(255), "Error parsing baseurl: Server URL port should be numeric", null }));
        ll.add(Arrays.asList(new Object[] { null, "https:/hostname", null, new Integer(255), "Error parsing baseurl: Server URL has an invalid scheme. http:// and https:// are supported", null }));
        ll.add(Arrays.asList(new Object[] { null, "https:hostname/prefix", null, new Integer(255), "Error parsing baseurl: Server URL has an invalid scheme. http:// and https:// are supported", null }));
        ll.add(Arrays.asList(new Object[] { null, "http//hostname/prefix", null, new Integer(255), "Error parsing baseurl: Server URL has an invalid scheme. http:// and https:// are supported", null }));
        ll.add(Arrays.asList(new Object[] { null, "http/hostname/prefix", null, new Integer(255), "Error parsing baseurl: Server URL has an invalid scheme. http:// and https:// are supported", null }));
        ll.add(Arrays.asList(new Object[] { null, "ftp://hostname", null, new Integer(255), "Error parsing baseurl: Server URL has an invalid scheme. http:// and https:// are supported", null }));
        ll.add(Arrays.asList(new Object[] { null, "git://hostname/prefix", null, new Integer(255), "Error parsing baseurl: Server URL has an invalid scheme. http:// and https:// are supported", null }));
        ll.add(Arrays.asList(new Object[] { null, "https://", null, new Integer(255), "Error parsing baseurl: Server URL is just a schema. Should include hostname, and/or port and path", null }));
        ll.add(Arrays.asList(new Object[] { null, "http://", null, new Integer(255), "Error parsing baseurl: Server URL is just a schema. Should include hostname, and/or port and path", null }));
    }
    // for all rows, change the expected exitCode when testing post subscription-manager-1.13.8-1
    if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.13.8-1")) {
        // post commit df95529a5edd0be456b3528b74344be283c4d258 bug 1119688
        for (List<Object> l : ll) {
            // Object bugzilla, String baseurl, String baseurlConfigured, Integer expectedExitCode, String expectedStdoutRegex, String expectedStderrRegex
            Integer expectedExitCode = (Integer) l.get(3);
            if (expectedExitCode.equals(255)) {
                // get the existing BlockedByBzBug
                BlockedByBzBug blockedByBzBug = (BlockedByBzBug) l.get(0);
                List<String> bugIds = blockedByBzBug == null ? new ArrayList<String>() : new ArrayList<String>(Arrays.asList(blockedByBzBug.getBugIds()));
                // Bug 1119688 - [RFE] subscription-manager better usability for scripts
                bugIds.add("1119688");
                blockedByBzBug = new BlockedByBzBug(bugIds.toArray(new String[] {}));
                l.set(0, blockedByBzBug);
                // EX_SOFTWARE
                l.set(3, new Integer(70));
            }
        }
    }
    return ll;
}
Also used : ArrayList(java.util.ArrayList) ArrayList(java.util.ArrayList) List(java.util.List) JSONObject(org.json.JSONObject) BlockedByBzBug(com.redhat.qe.auto.bugzilla.BlockedByBzBug)

Aggregations

BlockedByBzBug (com.redhat.qe.auto.bugzilla.BlockedByBzBug)67 ArrayList (java.util.ArrayList)67 List (java.util.List)67 JSONObject (org.json.JSONObject)21 HashSet (java.util.HashSet)18 File (java.io.File)14 DataProvider (org.testng.annotations.DataProvider)14 SubscriptionPool (rhsm.data.SubscriptionPool)7 BigInteger (java.math.BigInteger)5 ProductCert (rhsm.data.ProductCert)5 HashMap (java.util.HashMap)3 JSONArray (org.json.JSONArray)3 EntitlementCert (rhsm.data.EntitlementCert)3 Repo (rhsm.data.Repo)2 BugzillaAPIException (com.redhat.qe.auto.bugzilla.BugzillaAPIException)1 Matcher (java.util.regex.Matcher)1 Pattern (java.util.regex.Pattern)1 SkipException (org.testng.SkipException)1 ConsumerType (rhsm.base.ConsumerType)1 YumRepo (rhsm.data.YumRepo)1