Search in sources :

Example 16 with BlockedByBzBug

use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.

the class ProxyTests method getRegisterAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists.

protected List<List<Object>> getRegisterAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists() {
    List<List<Object>> ll = new ArrayList<List<Object>>();
    if (!isSetupBeforeSuiteComplete)
        return ll;
    if (clienttasks == null)
        return ll;
    String basicauthproxyUrl = String.format("%s:%s", sm_basicauthproxyHostname, sm_basicauthproxyPort);
    basicauthproxyUrl = basicauthproxyUrl.replaceAll(":$", "");
    String noauthproxyUrl = String.format("%s:%s", sm_noauthproxyHostname, sm_noauthproxyPort);
    noauthproxyUrl = noauthproxyUrl.replaceAll(":$", "");
    // "Invalid username or password";
    String uErrMsg = servertasks.invalidCredentialsMsg();
    String oErrMsg = /*"Organization/Owner bad-org does not exist."*/
    "Organization bad-org does not exist.";
    if (sm_serverType.equals(CandlepinType.katello))
        oErrMsg = "Couldn't find organization 'bad-org'";
    if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.18.2-1")) {
        // post commit ad982c13e79917e082f336255ecc42615e1e7707	1176219: Error out if bad proxy settings detected
        // basic auth proxy test data...
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.20.1-1")) {
            // commit c26af03e547209f216d29d02867d73843e1e5535	// Bug 1392709: Display better error msg., when wrong proxy is set up
            ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "1392709" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, pErrConMsg, basicauthproxy, sm_basicauthproxyLog, null }));
        } else {
            ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, null }));
        }
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, null }));
        if (false) {
            // DELETEME in favor of blockedByBadAuthBugs below
            if (clienttasks.isPackageVersion("python-rhsm", ">=", "1.18.5-1") && Integer.valueOf(clienttasks.redhatReleaseX) >= 7) {
                // post commit 214103dcffce29e31858ffee414d79c1b8063970	Reduce usage of m2crypto https://github.com/candlepin/python-rhsm/pull/184
                ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
                ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
                ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
                ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
                "", /*no password*/
                Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
            } else {
                ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
                ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
                ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
                ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
                "", /*no password*/
                Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
            }
        }
        Set<String> badAuthBugIds = new HashSet<String>();
        badAuthBugIds.addAll(Arrays.asList("1345962", "1119688", "755258", "1176219"));
        // Bug 1560727 - Uncaught proxy authentication failure (407) on RHEL7
        if (Integer.valueOf(clienttasks.redhatReleaseX) >= 7)
            badAuthBugIds.add("1560727");
        BlockedByBzBug blockedByBadAuthBugs = new BlockedByBzBug(badAuthBugIds.toArray(new String[] {}));
        if (clienttasks.isPackageVersion("python-rhsm", ">=", "1.18.5-1")) {
            // post commit 214103dcffce29e31858ffee414d79c1b8063970	Reduce usage of m2crypto https://github.com/candlepin/python-rhsm/pull/184
            ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(70), null, pErrConMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
            ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(70), null, pErrConMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
            ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(70), null, pErrConMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
            ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
            "", /*no password*/
            Integer.valueOf(70), null, pErrConMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        } else {
            ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
            ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
            ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
            ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
            "", /*no password*/
            Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        }
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, null, null, "bad-proxy", sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, null, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "838242" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, sm_basicauthproxyPassword, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1354667" }), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1354667" }), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, oErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        // no auth proxy test data...
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "ignored-username", "ignored-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort + "0", "", "", Integer.valueOf(70), null, nErrMsg, noauthproxy, sm_noauthproxyLog, null }));
        if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.20.1-1")) {
            // commit c26af03e547209f216d29d02867d73843e1e5535	// Bug 1392709: Display better error msg., when wrong proxy is set up
            ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "1392709" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_noauthproxyPort, "", "", Integer.valueOf(70), null, pErrConMsg, noauthproxy, sm_noauthproxyLog, null }));
        } else {
            ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_noauthproxyPort, "", "", Integer.valueOf(70), null, nErrMsg, noauthproxy, sm_noauthproxyLog, null }));
        }
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1354667" }), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1354667" }), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, oErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, null, null, "bad-proxy", sm_noauthproxyPort + "0", "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, "ignored-username", "ignored-password", "bad-proxy", sm_noauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "1176219", "1403387" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, "bad-proxy", null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(69), null, pErrMsg, /*DELETEME - THIS WAS A BUG 1403387 "Unable to reach the server at "+hostname+":"+port+prefix*/
        noauthproxy, sm_noauthproxyLog, null }));
    } else if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.13.9-1")) {
        // post commit a695ef2d1da882c5f851fde90a24f957b70a63ad
        // basic auth proxy test data...
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
        "", /*no password*/
        Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, null, null, "bad-proxy", sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, null, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "838242" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, sm_basicauthproxyPassword, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, oErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        // no auth proxy test data...
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "ignored-username", "ignored-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort + "0", "", "", Integer.valueOf(70), null, nErrMsg, noauthproxy, sm_noauthproxyLog, null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_noauthproxyPort, "", "", Integer.valueOf(70), null, nErrMsg, noauthproxy, sm_noauthproxyLog, null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, oErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, null, null, "bad-proxy", sm_noauthproxyPort + "0", "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, "ignored-username", "ignored-password", "bad-proxy", sm_noauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, "bad-proxy", null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, nErrMsg, noauthproxy, sm_noauthproxyLog, null }));
    } else if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.13.8-1")) {
        // post commit df95529a5edd0be456b3528b74344be283c4d258 bug 1119688		// EX_SOFTWARE=70
        // basic auth proxy test data...
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(70), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(70), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(70), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
        "", /*no password*/
        Integer.valueOf(70), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, null, null, "bad-proxy", sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, null, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258", "838242" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, sm_basicauthproxyPassword, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, oErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        // no auth proxy test data...
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "ignored-username", "ignored-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort + "0", "", "", Integer.valueOf(70), nErrMsg, null, noauthproxy, sm_noauthproxyLog, null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_noauthproxyPort, "", "", Integer.valueOf(70), nErrMsg, null, noauthproxy, sm_noauthproxyLog, null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, oErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, null, null, "bad-proxy", sm_noauthproxyPort + "0", "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, "ignored-username", "ignored-password", "bad-proxy", sm_noauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, "bad-proxy", null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), nErrMsg, null, noauthproxy, sm_noauthproxyLog, null }));
    } else {
        // basic auth proxy test data...
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { null, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(255), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, null }));
        ll.add(Arrays.asList(new Object[] { null, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(255), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(255), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(255), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(255), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
        "", /*no password*/
        Integer.valueOf(255), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, null, null, "bad-proxy", sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, null, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "755258", "838242" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, sm_basicauthproxyPassword, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(255), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(255), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(255), null, oErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
        // no auth proxy test data...
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "ignored-username", "ignored-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { null, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort + "0", "", "", Integer.valueOf(255), nErrMsg, null, noauthproxy, sm_noauthproxyLog, null }));
        ll.add(Arrays.asList(new Object[] { null, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_noauthproxyPort, "", "", Integer.valueOf(255), nErrMsg, null, noauthproxy, sm_noauthproxyLog, null }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(255), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(255), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(255), null, oErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, null, null, "bad-proxy", sm_noauthproxyPort + "0", "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, "ignored-username", "ignored-password", "bad-proxy", sm_noauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
        ll.add(Arrays.asList(new Object[] { null, sm_clientUsername, sm_clientPassword, sm_clientOrg, "bad-proxy", null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(255), nErrMsg, null, noauthproxy, sm_noauthproxyLog, null }));
    }
    return ll;
}
Also used : ArrayList(java.util.ArrayList) ArrayList(java.util.ArrayList) List(java.util.List) BlockedByBzBug(com.redhat.qe.auto.bugzilla.BlockedByBzBug) HashSet(java.util.HashSet)

Example 17 with BlockedByBzBug

use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.

the class ProxyTests method getRefreshAttemptsUsingProxyServerDataAs2dArray.

@DataProvider(name = "getRefreshAttemptsUsingProxyServerData")
public Object[][] getRefreshAttemptsUsingProxyServerDataAs2dArray() {
    // return TestNGUtils.convertListOfListsTo2dArray(getValidRegisterAttemptsUsingProxyServerDataAsListOfLists());
    List<List<Object>> ll = new ArrayList<List<Object>>();
    for (List<Object> l : getValidRegisterAttemptsUsingProxyServerDataAsListOfLists()) {
        // get the existing BlockedByBzBug
        BlockedByBzBug blockedByBzBug = (BlockedByBzBug) l.get(0);
        List<String> bugIds = blockedByBzBug == null ? new ArrayList<String>() : new ArrayList<String>(Arrays.asList(blockedByBzBug.getBugIds()));
        // add more BlockedByBzBug to rows that are expecting a network error
        if (l.get(8) == nErrMsg) {
            // Bug 975164 - subscription-manager refresh with --proxy is silently failing in rhsm.log
            bugIds.add("975164");
            // Bug 1345962 - unbound method endheaders() must be called with HTTPSConnection instance as first argument (got RhsmProxyHTTPSConnection instance instead)
            bugIds.add("1345962");
        }
        blockedByBzBug = new BlockedByBzBug(bugIds.toArray(new String[] {}));
        ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), l.get(7), l.get(8), l.get(9) }));
    }
    return TestNGUtils.convertListOfListsTo2dArray(ll);
}
Also used : ArrayList(java.util.ArrayList) ArrayList(java.util.ArrayList) List(java.util.List) BlockedByBzBug(com.redhat.qe.auto.bugzilla.BlockedByBzBug) DataProvider(org.testng.annotations.DataProvider)

Example 18 with BlockedByBzBug

use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.

the class ProxyTests method getIdentityAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists.

protected List<List<Object>> getIdentityAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists() {
    List<List<Object>> ll = new ArrayList<List<Object>>();
    for (List<Object> l : getRegisterAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists()) {
        // only include dataProvided rows where org is valid
        if (l.get(3).equals(sm_clientOrg)) {
            // get the existing BlockedByBzBug
            BlockedByBzBug blockedByBzBug = (BlockedByBzBug) l.get(0);
            List<String> bugIds = blockedByBzBug == null ? new ArrayList<String>() : new ArrayList<String>(Arrays.asList(blockedByBzBug.getBugIds()));
            // add more BlockedByBzBug to rows that are expecting a network error
            if (l.get(12) == nErrMsg || l.get(12) == pErr407Msg) {
                // Bug 848195 	Error while checking server version: Proxy connection failed: 407
                bugIds.add("848195");
                // Bug 848190 	Error while checking server version: (111, 'Connection refused')
                bugIds.add("848190");
                // Bug 848184 	Error while checking server version: (-2, 'Name or service not known')
                bugIds.add("848184");
            }
            blockedByBzBug = new BlockedByBzBug(bugIds.toArray(new String[] {}));
            ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), l.get(7), l.get(8), l.get(9), l.get(10), l.get(11), l.get(12), l.get(13), l.get(14), l.get(15), l.get(16) }));
        }
    }
    return ll;
}
Also used : ArrayList(java.util.ArrayList) ArrayList(java.util.ArrayList) List(java.util.List) BlockedByBzBug(com.redhat.qe.auto.bugzilla.BlockedByBzBug)

Example 19 with BlockedByBzBug

use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.

the class ProxyTests method getStatusAttemptsUsingProxyServerDataAs2dArray.

@DataProvider(name = "getStatusAttemptsUsingProxyServerData")
public Object[][] getStatusAttemptsUsingProxyServerDataAs2dArray() {
    // return TestNGUtils.convertListOfListsTo2dArray(getValidRegisterAttemptsUsingProxyServerDataAsListOfLists());
    List<List<Object>> ll = new ArrayList<List<Object>>();
    for (List<Object> l : getValidRegisterAttemptsUsingProxyServerDataAsListOfLists()) {
        // nullify the blockedByBug parameter since this function was originally not blocked by any bug
        BlockedByBzBug blockedByBzBug = null;
        List<String> bugIds = blockedByBzBug == null ? new ArrayList<String>() : new ArrayList<String>(Arrays.asList(blockedByBzBug.getBugIds()));
        // add BlockedByBzBug to rows that are expecting a proxy error
        if (l.get(8) == /*stdout*/
        pErrMsg || l.get(9) == /*stderr*/
        pErrMsg || l.get(8) == /*stdout*/
        rErrMsg || l.get(9) == /*stderr*/
        rErrMsg) {
            // Bug 1336551 - status and version modules are not using cache when bad command line proxy is specified
            bugIds.add("1336551");
        }
        // Bug 1345962 - unbound method endheaders() must be called with HTTPSConnection instance as first argument (got RhsmProxyHTTPSConnection instance instead)
        bugIds.add("1345962");
        blockedByBzBug = new BlockedByBzBug(bugIds.toArray(new String[] {}));
        // Note: Because the status module should return cached results when it fails to connect to the server, the exitCode should always be 0 and we'll null out the asserts on stdout and stderr
        if (clienttasks.isPackageVersion("subscription-manager", "<", "1.18.2-1")) {
            // pre-commit ad982c13e79917e082f336255ecc42615e1e7707	1176219: Error out if bad proxy settings detected
            ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), Integer.valueOf(0), /*exitCode*/
            null, /*stdout*/
            null /*stderr*/
            }));
        } else {
            // not anymore...  since CLOSED WONFIX Bug 1336551 - status and version modules are not using cache when bad command line proxy is specified
            ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), l.get(7), /*exitCode*/
            l.get(8), /*stdout*/
            l.get(9) /*stderr*/
            }));
        }
    }
    return TestNGUtils.convertListOfListsTo2dArray(ll);
}
Also used : ArrayList(java.util.ArrayList) ArrayList(java.util.ArrayList) List(java.util.List) BlockedByBzBug(com.redhat.qe.auto.bugzilla.BlockedByBzBug) DataProvider(org.testng.annotations.DataProvider)

Example 20 with BlockedByBzBug

use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.

the class ProxyTests method getStatusAttemptsUsingProxyServerViaRhsmConfigDataAs2dArray.

@DataProvider(name = "getStatusAttemptsUsingProxyServerViaRhsmConfigData")
public Object[][] getStatusAttemptsUsingProxyServerViaRhsmConfigDataAs2dArray() {
    // return TestNGUtils.convertListOfListsTo2dArray(getValidRegisterAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists());
    List<List<Object>> ll = new ArrayList<List<Object>>();
    for (List<Object> l : getValidRegisterAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists()) {
        // Object blockedByBug, String username, String password, Sring org, String proxy, String proxyuser, String proxypassword, String proxy_hostnameConfig, String proxy_portConfig, String proxy_userConfig, String proxy_passwordConfig, Integer exitCode, String stdout, String stderr, SSHCommandRunner proxyRunner, String proxyLog, String proxyLogGrepPattern
        // nullify the blockedByBug parameter since this function was originally not blocked by any bug
        BlockedByBzBug blockedByBzBug = null;
        List<String> bugIds = blockedByBzBug == null ? new ArrayList<String>() : new ArrayList<String>(Arrays.asList(blockedByBzBug.getBugIds()));
        // Bug 1345962 - unbound method endheaders() must be called with HTTPSConnection instance as first argument (got RhsmProxyHTTPSConnection instance instead)
        bugIds.add("1345962");
        // Bug 1419197 - subscription-manager status with bad proxy configurations should be using cache
        if (l.get(13) == pErr407Msg)
            bugIds.add("1419197");
        // Bug 1495286 - subscription-manager status module is no longer using cache when rhsm.conf is configured with a bad proxy
        if (l.get(13) == pErrConMsg)
            bugIds.add("1495286");
        blockedByBzBug = new BlockedByBzBug(bugIds.toArray(new String[] {}));
        // this accepted change in behavior was decided in Bug 1419197 - subscription-manager status with bad proxy configurations should be using cache
        if (l.get(13) == pErr407Msg) {
            ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), l.get(7), l.get(8), l.get(9), l.get(10), l.get(11), /*exitCode*/
            l.get(12), /*stdout*/
            l.get(13), /*stderr*/
            l.get(14), l.get(15), l.get(16) }));
            continue;
        }
        // when l.get(4)!=null, then a proxy will be specified as a command line arg which trumps the rhsm.conf configuration and NO cache will be used
        if (l.get(4) != null) {
            // when a proxy is specified on the command line (l.get(4)), no cache will be used, simply assert all of the expected results
            ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), l.get(7), l.get(8), l.get(9), l.get(10), l.get(11), /*exitCode*/
            l.get(12), /*stdout*/
            l.get(13), /*stderr*/
            l.get(14), l.get(15), l.get(16) }));
            continue;
        }
        // if we get to here, then...
        // the status module should return cached results when it fails to connect to the server,
        // the exitCode should always be 0 and we'll null out the asserts on stdout and stderr
        ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), l.get(7), l.get(8), l.get(9), l.get(10), Integer.valueOf(0), /*exitCode*/
        null, /*stdout*/
        null, /*stderr*/
        l.get(14), l.get(15), l.get(16) }));
    }
    return TestNGUtils.convertListOfListsTo2dArray(ll);
}
Also used : ArrayList(java.util.ArrayList) ArrayList(java.util.ArrayList) List(java.util.List) BlockedByBzBug(com.redhat.qe.auto.bugzilla.BlockedByBzBug) DataProvider(org.testng.annotations.DataProvider)

Aggregations

BlockedByBzBug (com.redhat.qe.auto.bugzilla.BlockedByBzBug)67 ArrayList (java.util.ArrayList)67 List (java.util.List)67 JSONObject (org.json.JSONObject)21 HashSet (java.util.HashSet)18 File (java.io.File)14 DataProvider (org.testng.annotations.DataProvider)14 SubscriptionPool (rhsm.data.SubscriptionPool)7 BigInteger (java.math.BigInteger)5 ProductCert (rhsm.data.ProductCert)5 HashMap (java.util.HashMap)3 JSONArray (org.json.JSONArray)3 EntitlementCert (rhsm.data.EntitlementCert)3 Repo (rhsm.data.Repo)2 BugzillaAPIException (com.redhat.qe.auto.bugzilla.BugzillaAPIException)1 Matcher (java.util.regex.Matcher)1 Pattern (java.util.regex.Pattern)1 SkipException (org.testng.SkipException)1 ConsumerType (rhsm.base.ConsumerType)1 YumRepo (rhsm.data.YumRepo)1