Bug 825370 - Fault 53: 'v1 is not a valid parameter for the Bugzilla::Bug::match function.'
Fault 53: 'v1 is not a valid parameter for the Bugzilla::Bug::match function.'
Status: CLOSED NOTABUG
Product: Bugzilla
Classification: Community
Component: Bugzilla General (Show other bugs)
4.2
All Linux
unspecified Severity medium (vote)
: ---
: ---
Assigned To: PnT DevOps Devs
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2012-05-25 16:00 EDT by Jeff Bastian
Modified: 2013-06-23 21:49 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-05-25 16:19:51 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
example script to query bugzilla (637 bytes, text/plain)
2012-05-25 16:03 EDT, Jeff Bastian
no flags Details
patched python-bugzilla module (122.57 KB, application/x-gzip)
2012-05-25 16:06 EDT, Jeff Bastian
no flags Details

  None (edit)
Description Jeff Bastian 2012-05-25 16:00:20 EDT
Description of problem:
I'm using the python-bugzilla module for some custom reports.  Since the upgrade to BZ 4.2, my boolean searches are failing with an error:
    xmlrpclib.Fault: <Fault 53: 'v1 is not a valid parameter for
    the Bugzilla::Bug::match function.'>

I noticed the field names have changed from
   field0-0-0
   type0-0-0
   value0-0-0 
to
   f1
   o1
   v1
so I updated my script, but it's failing with the error shown above.


Version-Release number of selected component (if applicable):
Bugzilla 4.2
python-bugzilla-0.6.3pre-2.fc16.noarch (*)

How reproducible:
every time

Steps to Reproduce:
1. set your username and password in the attached script
2. run the script
  
Actual results:
$ ./bz-query.py 
Logged into bugzilla
Traceback (most recent call last):
  File "./bz-query.py", line 26, in <module>
    results = BZ.query(query)
  File "/usr/lib/python2.7/site-packages/bugzilla/base.py", line 536, in query
    r = self._query(query)
  File "/usr/lib/python2.7/site-packages/bugzilla/bugzilla4.py", line 160, in _query
    ret = self._proxy.Bug.search(query)
  File "/usr/lib64/python2.7/xmlrpclib.py", line 1224, in __call__
    return self.__send(self.__name, args)
  File "/usr/lib64/python2.7/xmlrpclib.py", line 1578, in __request
    verbose=self.__verbose
  File "/usr/lib64/python2.7/xmlrpclib.py", line 1264, in request
    return self.single_request(host, handler, request_body, verbose)
  File "/usr/lib/python2.7/site-packages/bugzilla/base.py", line 1035, in single_request_with_cookies
    return self.parse_response(response)
  File "/usr/lib64/python2.7/xmlrpclib.py", line 1473, in parse_response
    return u.close()
  File "/usr/lib64/python2.7/xmlrpclib.py", line 793, in close
    raise Fault(**self._stack[0])
xmlrpclib.Fault: <Fault 53: 'v1 is not a valid parameter for the Bugzilla::Bug::match function.'>

Expected results:
successful run of script

Additional info:
python-bugzilla-0.6.3pre-2.fc16.noarch is a local build of the latest source from git://git.fedorahosted.org/git/python-bugzilla which contains some patches to fix issues with the BZ 4.2 upgrade
Comment 1 Jeff Bastian 2012-05-25 16:03:28 EDT
Created attachment 586940 [details]
example script to query bugzilla

The attached script should perform a search equivalent to:

https://bugzilla.redhat.com/buglist.cgi?f1=keywords&list_id=38384&o1=substring&classification=Fedora&query_format=advanced&bug_status=NEW&bug_status=ASSIGNED&v1=Patch&product=Fedora

Notice v1=Patch is valid in the URL, but the xmlrpc interface complains "v1 is not a valid parameter"
Comment 2 Jeff Bastian 2012-05-25 16:06:19 EDT
Created attachment 586941 [details]
patched python-bugzilla module

If it helps, attached is my updated python-bugzilla module
Comment 3 Jeff Bastian 2012-05-25 16:19:51 EDT
Ahh, I discovered that adding a query_format parameter fixed the problem:
    query['query_format'] = 'advanced'

This was not necessary with Bugzilla 3.6.  I'll update my scripts.

Note You need to log in before you can comment on or make changes to this bug.