Bug 1328223

Summary: spacewalk-clone-by-date recursion failure using --blacklist option
Product: Red Hat Satellite 5 Reporter: Shannon Hughes <shughes>
Component: ServerAssignee: Tomáš Kašpárek <tkasparek>
Status: CLOSED DUPLICATE QA Contact: Red Hat Satellite QA List <satqe-list>
Severity: high Docs Contact:
Priority: high    
Version: 570CC: ggainey, jwildman, tlestach, wpinheir, xdmoon
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-08-17 18:34:21 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1222906    
Bug Blocks: 465198, 1127217    

Description Shannon Hughes 2016-04-18 18:49:55 UTC
Description of problem:

When running spacewalk-clone-by-date on a 32bit rhel6 channel using the blacklist flag we see a recursion issue and seems to be masked by python traceback: 

> 
> spacewalk-clone-by-date -u myid --blacklist="kernel*"  --to_date="2016-03-31" --assumeyes --channels=rhel-i386-server-6 lonestar-prod-rhel-i386-server-6 --channels=rhn-tools-rhel-i386-server-6 lonestar-prod-rhn-tools-rhel-i386-server-6
> 
> ....
> File "/usr/lib64/python2.6/httplib.py", line 710, in _set_hostport
>     if host and host[0] == '[' and host[-1] == ']':
> RuntimeError: maximum recursion depth exceeded in cmp

This seems to be an edge case of the following bugzilla: 

https://bugzilla.redhat.com/show_bug.cgi?id=1222906

spacewalk-utils-2.3.2-23.el6sat.noarch

Comment 2 Grant Gainey 2016-08-17 18:34:21 UTC
Closing this as a dup of 1331023 - testing this scenario with a potential fix for '023 shows it working. Watch '023 for continued investigation/details.

*** This bug has been marked as a duplicate of bug 1331023 ***