use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.
the class ProxyTests method getRegisterAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists.
protected List<List<Object>> getRegisterAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists() {
List<List<Object>> ll = new ArrayList<List<Object>>();
if (!isSetupBeforeSuiteComplete)
return ll;
if (clienttasks == null)
return ll;
String basicauthproxyUrl = String.format("%s:%s", sm_basicauthproxyHostname, sm_basicauthproxyPort);
basicauthproxyUrl = basicauthproxyUrl.replaceAll(":$", "");
String noauthproxyUrl = String.format("%s:%s", sm_noauthproxyHostname, sm_noauthproxyPort);
noauthproxyUrl = noauthproxyUrl.replaceAll(":$", "");
// "Invalid username or password";
String uErrMsg = servertasks.invalidCredentialsMsg();
String oErrMsg = /*"Organization/Owner bad-org does not exist."*/
"Organization bad-org does not exist.";
if (sm_serverType.equals(CandlepinType.katello))
oErrMsg = "Couldn't find organization 'bad-org'";
if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.18.2-1")) {
// post commit ad982c13e79917e082f336255ecc42615e1e7707 1176219: Error out if bad proxy settings detected
// basic auth proxy test data...
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.20.1-1")) {
// commit c26af03e547209f216d29d02867d73843e1e5535 // Bug 1392709: Display better error msg., when wrong proxy is set up
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "1392709" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, pErrConMsg, basicauthproxy, sm_basicauthproxyLog, null }));
} else {
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, null }));
}
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, null }));
if (false) {
// DELETEME in favor of blockedByBadAuthBugs below
if (clienttasks.isPackageVersion("python-rhsm", ">=", "1.18.5-1") && Integer.valueOf(clienttasks.redhatReleaseX) >= 7) {
// post commit 214103dcffce29e31858ffee414d79c1b8063970 Reduce usage of m2crypto https://github.com/candlepin/python-rhsm/pull/184
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
"", /*no password*/
Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
} else {
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1176219" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
"", /*no password*/
Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
}
}
Set<String> badAuthBugIds = new HashSet<String>();
badAuthBugIds.addAll(Arrays.asList("1345962", "1119688", "755258", "1176219"));
// Bug 1560727 - Uncaught proxy authentication failure (407) on RHEL7
if (Integer.valueOf(clienttasks.redhatReleaseX) >= 7)
badAuthBugIds.add("1560727");
BlockedByBzBug blockedByBadAuthBugs = new BlockedByBzBug(badAuthBugIds.toArray(new String[] {}));
if (clienttasks.isPackageVersion("python-rhsm", ">=", "1.18.5-1")) {
// post commit 214103dcffce29e31858ffee414d79c1b8063970 Reduce usage of m2crypto https://github.com/candlepin/python-rhsm/pull/184
ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(70), null, pErrConMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(70), null, pErrConMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(70), null, pErrConMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
"", /*no password*/
Integer.valueOf(70), null, pErrConMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
} else {
ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { blockedByBadAuthBugs, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
"", /*no password*/
Integer.valueOf(70), null, pErr407Msg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
}
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, null, null, "bad-proxy", sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, null, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "838242" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, sm_basicauthproxyPassword, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1354667" }), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1354667" }), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, oErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
// no auth proxy test data...
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "ignored-username", "ignored-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort + "0", "", "", Integer.valueOf(70), null, nErrMsg, noauthproxy, sm_noauthproxyLog, null }));
if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.20.1-1")) {
// commit c26af03e547209f216d29d02867d73843e1e5535 // Bug 1392709: Display better error msg., when wrong proxy is set up
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "1392709" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_noauthproxyPort, "", "", Integer.valueOf(70), null, pErrConMsg, noauthproxy, sm_noauthproxyLog, null }));
} else {
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_noauthproxyPort, "", "", Integer.valueOf(70), null, nErrMsg, noauthproxy, sm_noauthproxyLog, null }));
}
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1354667" }), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "1354667" }), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, oErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, null, null, "bad-proxy", sm_noauthproxyPort + "0", "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, "ignored-username", "ignored-password", "bad-proxy", sm_noauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "1176219", "1403387" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, "bad-proxy", null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(69), null, pErrMsg, /*DELETEME - THIS WAS A BUG 1403387 "Unable to reach the server at "+hostname+":"+port+prefix*/
noauthproxy, sm_noauthproxyLog, null }));
} else if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.13.9-1")) {
// post commit a695ef2d1da882c5f851fde90a24f957b70a63ad
// basic auth proxy test data...
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
"", /*no password*/
Integer.valueOf(70), null, nErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, null, null, "bad-proxy", sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, null, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258", "838242" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, sm_basicauthproxyPassword, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, oErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
// no auth proxy test data...
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "ignored-username", "ignored-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort + "0", "", "", Integer.valueOf(70), null, nErrMsg, noauthproxy, sm_noauthproxyLog, null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_noauthproxyPort, "", "", Integer.valueOf(70), null, nErrMsg, noauthproxy, sm_noauthproxyLog, null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, oErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, null, null, "bad-proxy", sm_noauthproxyPort + "0", "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, "ignored-username", "ignored-password", "bad-proxy", sm_noauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1345962", "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, "bad-proxy", null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, nErrMsg, noauthproxy, sm_noauthproxyLog, null }));
} else if (clienttasks.isPackageVersion("subscription-manager", ">=", "1.13.8-1")) {
// post commit df95529a5edd0be456b3528b74344be283c4d258 bug 1119688 // EX_SOFTWARE=70
// basic auth proxy test data...
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(70), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(70), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(70), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
"", /*no password*/
Integer.valueOf(70), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, null, null, "bad-proxy", sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, null, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258", "838242" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, sm_basicauthproxyPassword, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(70), null, oErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
// no auth proxy test data...
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "ignored-username", "ignored-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort + "0", "", "", Integer.valueOf(70), nErrMsg, null, noauthproxy, sm_noauthproxyLog, null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_noauthproxyPort, "", "", Integer.valueOf(70), nErrMsg, null, noauthproxy, sm_noauthproxyLog, null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), null, oErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, null, null, "bad-proxy", sm_noauthproxyPort + "0", "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688", "755258" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, "ignored-username", "ignored-password", "bad-proxy", sm_noauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "1119688" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, "bad-proxy", null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(70), nErrMsg, null, noauthproxy, sm_noauthproxyLog, null }));
} else {
// basic auth proxy test data...
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { null, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(255), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, null }));
ll.add(Arrays.asList(new Object[] { null, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(255), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", sm_basicauthproxyPassword, Integer.valueOf(255), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, "bad-password", Integer.valueOf(255), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "bad-username", "bad-password", Integer.valueOf(255), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, "", /*no username*/
"", /*no password*/
Integer.valueOf(255), nErrMsg, null, basicauthproxy, sm_basicauthproxyLog, "TCP_DENIED" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, null, null, "bad-proxy", sm_basicauthproxyPort + "0", sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, null, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug(new String[] { "755258", "838242" }), sm_clientUsername, sm_clientPassword, sm_clientOrg, basicauthproxyUrl, sm_basicauthproxyUsername, sm_basicauthproxyPassword, "bad-proxy", sm_basicauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(0), null, null, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(255), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(255), null, uErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_basicauthproxyHostname, sm_basicauthproxyPort, sm_basicauthproxyUsername, sm_basicauthproxyPassword, Integer.valueOf(255), null, oErrMsg, basicauthproxy, sm_basicauthproxyLog, "TCP_MISS" }));
// no auth proxy test data...
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "ignored-username", "ignored-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { null, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort + "0", "", "", Integer.valueOf(255), nErrMsg, null, noauthproxy, sm_noauthproxyLog, null }));
ll.add(Arrays.asList(new Object[] { null, sm_clientUsername, sm_clientPassword, sm_clientOrg, null, null, null, "bad-proxy", sm_noauthproxyPort, "", "", Integer.valueOf(255), nErrMsg, null, noauthproxy, sm_noauthproxyLog, null }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), "bad-username", sm_clientPassword, sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(255), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, "bad-password", sm_clientOrg, null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(255), null, uErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, "bad-org", null, null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(255), null, oErrMsg, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, null, null, "bad-proxy", sm_noauthproxyPort + "0", "", "", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { new BlockedByBzBug("755258"), sm_clientUsername, sm_clientPassword, sm_clientOrg, noauthproxyUrl, "ignored-username", "ignored-password", "bad-proxy", sm_noauthproxyPort + "0", "bad-username", "bad-password", Integer.valueOf(0), null, null, noauthproxy, sm_noauthproxyLog, "Connect" }));
ll.add(Arrays.asList(new Object[] { null, sm_clientUsername, sm_clientPassword, sm_clientOrg, "bad-proxy", null, null, sm_noauthproxyHostname, sm_noauthproxyPort, "", "", Integer.valueOf(255), nErrMsg, null, noauthproxy, sm_noauthproxyLog, null }));
}
return ll;
}
use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.
the class ProxyTests method getRefreshAttemptsUsingProxyServerDataAs2dArray.
@DataProvider(name = "getRefreshAttemptsUsingProxyServerData")
public Object[][] getRefreshAttemptsUsingProxyServerDataAs2dArray() {
// return TestNGUtils.convertListOfListsTo2dArray(getValidRegisterAttemptsUsingProxyServerDataAsListOfLists());
List<List<Object>> ll = new ArrayList<List<Object>>();
for (List<Object> l : getValidRegisterAttemptsUsingProxyServerDataAsListOfLists()) {
// get the existing BlockedByBzBug
BlockedByBzBug blockedByBzBug = (BlockedByBzBug) l.get(0);
List<String> bugIds = blockedByBzBug == null ? new ArrayList<String>() : new ArrayList<String>(Arrays.asList(blockedByBzBug.getBugIds()));
// add more BlockedByBzBug to rows that are expecting a network error
if (l.get(8) == nErrMsg) {
// Bug 975164 - subscription-manager refresh with --proxy is silently failing in rhsm.log
bugIds.add("975164");
// Bug 1345962 - unbound method endheaders() must be called with HTTPSConnection instance as first argument (got RhsmProxyHTTPSConnection instance instead)
bugIds.add("1345962");
}
blockedByBzBug = new BlockedByBzBug(bugIds.toArray(new String[] {}));
ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), l.get(7), l.get(8), l.get(9) }));
}
return TestNGUtils.convertListOfListsTo2dArray(ll);
}
use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.
the class ProxyTests method getIdentityAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists.
protected List<List<Object>> getIdentityAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists() {
List<List<Object>> ll = new ArrayList<List<Object>>();
for (List<Object> l : getRegisterAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists()) {
// only include dataProvided rows where org is valid
if (l.get(3).equals(sm_clientOrg)) {
// get the existing BlockedByBzBug
BlockedByBzBug blockedByBzBug = (BlockedByBzBug) l.get(0);
List<String> bugIds = blockedByBzBug == null ? new ArrayList<String>() : new ArrayList<String>(Arrays.asList(blockedByBzBug.getBugIds()));
// add more BlockedByBzBug to rows that are expecting a network error
if (l.get(12) == nErrMsg || l.get(12) == pErr407Msg) {
// Bug 848195 Error while checking server version: Proxy connection failed: 407
bugIds.add("848195");
// Bug 848190 Error while checking server version: (111, 'Connection refused')
bugIds.add("848190");
// Bug 848184 Error while checking server version: (-2, 'Name or service not known')
bugIds.add("848184");
}
blockedByBzBug = new BlockedByBzBug(bugIds.toArray(new String[] {}));
ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), l.get(7), l.get(8), l.get(9), l.get(10), l.get(11), l.get(12), l.get(13), l.get(14), l.get(15), l.get(16) }));
}
}
return ll;
}
use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.
the class ProxyTests method getStatusAttemptsUsingProxyServerDataAs2dArray.
@DataProvider(name = "getStatusAttemptsUsingProxyServerData")
public Object[][] getStatusAttemptsUsingProxyServerDataAs2dArray() {
// return TestNGUtils.convertListOfListsTo2dArray(getValidRegisterAttemptsUsingProxyServerDataAsListOfLists());
List<List<Object>> ll = new ArrayList<List<Object>>();
for (List<Object> l : getValidRegisterAttemptsUsingProxyServerDataAsListOfLists()) {
// nullify the blockedByBug parameter since this function was originally not blocked by any bug
BlockedByBzBug blockedByBzBug = null;
List<String> bugIds = blockedByBzBug == null ? new ArrayList<String>() : new ArrayList<String>(Arrays.asList(blockedByBzBug.getBugIds()));
// add BlockedByBzBug to rows that are expecting a proxy error
if (l.get(8) == /*stdout*/
pErrMsg || l.get(9) == /*stderr*/
pErrMsg || l.get(8) == /*stdout*/
rErrMsg || l.get(9) == /*stderr*/
rErrMsg) {
// Bug 1336551 - status and version modules are not using cache when bad command line proxy is specified
bugIds.add("1336551");
}
// Bug 1345962 - unbound method endheaders() must be called with HTTPSConnection instance as first argument (got RhsmProxyHTTPSConnection instance instead)
bugIds.add("1345962");
blockedByBzBug = new BlockedByBzBug(bugIds.toArray(new String[] {}));
// Note: Because the status module should return cached results when it fails to connect to the server, the exitCode should always be 0 and we'll null out the asserts on stdout and stderr
if (clienttasks.isPackageVersion("subscription-manager", "<", "1.18.2-1")) {
// pre-commit ad982c13e79917e082f336255ecc42615e1e7707 1176219: Error out if bad proxy settings detected
ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), Integer.valueOf(0), /*exitCode*/
null, /*stdout*/
null /*stderr*/
}));
} else {
// not anymore... since CLOSED WONFIX Bug 1336551 - status and version modules are not using cache when bad command line proxy is specified
ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), l.get(7), /*exitCode*/
l.get(8), /*stdout*/
l.get(9) /*stderr*/
}));
}
}
return TestNGUtils.convertListOfListsTo2dArray(ll);
}
use of com.redhat.qe.auto.bugzilla.BlockedByBzBug in project rhsm-qe by RedHatQE.
the class ProxyTests method getStatusAttemptsUsingProxyServerViaRhsmConfigDataAs2dArray.
@DataProvider(name = "getStatusAttemptsUsingProxyServerViaRhsmConfigData")
public Object[][] getStatusAttemptsUsingProxyServerViaRhsmConfigDataAs2dArray() {
// return TestNGUtils.convertListOfListsTo2dArray(getValidRegisterAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists());
List<List<Object>> ll = new ArrayList<List<Object>>();
for (List<Object> l : getValidRegisterAttemptsUsingProxyServerViaRhsmConfigDataAsListOfLists()) {
// Object blockedByBug, String username, String password, Sring org, String proxy, String proxyuser, String proxypassword, String proxy_hostnameConfig, String proxy_portConfig, String proxy_userConfig, String proxy_passwordConfig, Integer exitCode, String stdout, String stderr, SSHCommandRunner proxyRunner, String proxyLog, String proxyLogGrepPattern
// nullify the blockedByBug parameter since this function was originally not blocked by any bug
BlockedByBzBug blockedByBzBug = null;
List<String> bugIds = blockedByBzBug == null ? new ArrayList<String>() : new ArrayList<String>(Arrays.asList(blockedByBzBug.getBugIds()));
// Bug 1345962 - unbound method endheaders() must be called with HTTPSConnection instance as first argument (got RhsmProxyHTTPSConnection instance instead)
bugIds.add("1345962");
// Bug 1419197 - subscription-manager status with bad proxy configurations should be using cache
if (l.get(13) == pErr407Msg)
bugIds.add("1419197");
// Bug 1495286 - subscription-manager status module is no longer using cache when rhsm.conf is configured with a bad proxy
if (l.get(13) == pErrConMsg)
bugIds.add("1495286");
blockedByBzBug = new BlockedByBzBug(bugIds.toArray(new String[] {}));
// this accepted change in behavior was decided in Bug 1419197 - subscription-manager status with bad proxy configurations should be using cache
if (l.get(13) == pErr407Msg) {
ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), l.get(7), l.get(8), l.get(9), l.get(10), l.get(11), /*exitCode*/
l.get(12), /*stdout*/
l.get(13), /*stderr*/
l.get(14), l.get(15), l.get(16) }));
continue;
}
// when l.get(4)!=null, then a proxy will be specified as a command line arg which trumps the rhsm.conf configuration and NO cache will be used
if (l.get(4) != null) {
// when a proxy is specified on the command line (l.get(4)), no cache will be used, simply assert all of the expected results
ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), l.get(7), l.get(8), l.get(9), l.get(10), l.get(11), /*exitCode*/
l.get(12), /*stdout*/
l.get(13), /*stderr*/
l.get(14), l.get(15), l.get(16) }));
continue;
}
// if we get to here, then...
// the status module should return cached results when it fails to connect to the server,
// the exitCode should always be 0 and we'll null out the asserts on stdout and stderr
ll.add(Arrays.asList(new Object[] { blockedByBzBug, l.get(1), l.get(2), l.get(3), l.get(4), l.get(5), l.get(6), l.get(7), l.get(8), l.get(9), l.get(10), Integer.valueOf(0), /*exitCode*/
null, /*stdout*/
null, /*stderr*/
l.get(14), l.get(15), l.get(16) }));
}
return TestNGUtils.convertListOfListsTo2dArray(ll);
}
Aggregations