| *** Settings *** |
| Documentation Connections and authentication module stability tests. |
| |
| Resource ../lib/bmc_redfish_resource.robot |
| Resource ../lib/bmc_network_utils.robot |
| Resource ../lib/openbmc_ffdc.robot |
| Resource ../lib/resource.robot |
| Resource ../lib/utils.robot |
| Resource ../lib/connection_client.robot |
| Resource ../gui/lib/gui_resource.robot |
| Library ../lib/bmc_network_utils.py |
| |
| Library SSHLibrary |
| Library Collections |
| Library XvfbRobot |
| Library OperatingSystem |
| Library SeleniumLibrary 120 120 |
| Library Telnet 30 Seconds |
| Library Screenshot |
| |
| |
| Suite Setup Redfish.Logout |
| |
| Variables ../gui/data/gui_variables.py |
| |
| *** Variables *** |
| |
| ${iterations} 10000 |
| ${loop_iteration} ${1000} |
| ${hostname} testhostname |
| ${MAX_UNAUTH_PER_IP} ${5} |
| ${bmc_url} https://${OPENBMC_HOST} |
| |
| |
| *** Test Cases *** |
| |
| Test Patch Without Auth Token Fails |
| [Documentation] Send patch method without auth token and verify it throws an error. |
| [Tags] Test_Patch_Without_Auth_Token_Fails |
| |
| ${active_channel_config}= Get Active Channel Config |
| ${ethernet_interface}= Set Variable ${active_channel_config['${CHANNEL_NUMBER}']['name']} |
| |
| Redfish.Patch ${REDFISH_NW_ETH_IFACE}${ethernet_interface} body={'HostName': '${hostname}'} |
| ... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] |
| |
| |
| Flood Patch Without Auth Token And Check Stability Of BMC |
| [Documentation] Flood patch method without auth token and check BMC stability. |
| [Tags] Flood_Patch_Without_Auth_Token_And_Check_Stability_Of_BMC |
| |
| @{fail_list}= Create List |
| |
| ${active_channel_config}= Get Active Channel Config |
| ${ethernet_interface}= Set Variable ${active_channel_config['${CHANNEL_NUMBER}']['name']} |
| |
| FOR ${iter} IN RANGE ${1} ${iterations} + 1 |
| Log To Console ${iter}th iteration Patch Request without valid session token |
| # Expected valid fail status response code. |
| Redfish.Patch ${REDFISH_NW_ETH_IFACE}${ethernet_interface} body={'HostName': '${hostname}'} |
| ... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] |
| |
| # Every 100th iteration, check BMC allows patch with auth token. |
| ${status}= Run Keyword If ${iter} % 100 == 0 Run Keyword And Return Status |
| ... Login And Configure Hostname ${REDFISH_NW_ETH_IFACE}${ethernet_interface} |
| Run Keyword If ${status} == False Append To List ${fail_list} ${iter} |
| END |
| ${verify_count}= Evaluate ${iterations}/100 |
| ${fail_count}= Get Length ${fail_list} |
| |
| Should Be Equal As Integers ${fail_count} ${0} |
| ... msg=Patch operation failed ${fail_count} times in ${verify_count} attempts; fails at iterations ${fail_list} |
| |
| |
| Verify User Cannot Login After 5 Non-Logged In Sessions |
| [Documentation] User should not be able to login when there |
| ... are 5 non-logged in sessions. |
| [Tags] Verify_User_Cannot_Login_After_5_Non-Logged_In_Sessions |
| |
| FOR ${iter} IN RANGE ${0} ${MAX_UNAUTH_PER_IP} |
| SSHLibrary.Open Connection ${OPENBMC_HOST} |
| Start Process ssh ${OPENBMC_USERNAME}@${OPENBMC_HOST} shell=True |
| END |
| |
| SSHLibrary.Open Connection ${OPENBMC_HOST} |
| ${status}= Run Keyword And Return Status SSHLibrary.Login ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} |
| |
| Should Be Equal ${status} ${False} |
| |
| |
| Test Post Without Auth Token Fails |
| [Documentation] Send post method without auth token and verify it throws an error. |
| [Tags] Test_Post_Without_Auth_Token_Fails |
| |
| ${user_info}= Create Dictionary |
| ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} |
| Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} |
| ... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] |
| |
| |
| Flood Post Without Auth Token And Check Stability Of BMC |
| [Documentation] Flood post method without auth token and check BMC stability. |
| [Tags] Flood_Post_Without_Auth_Token_And_Check_Stability_Of_BMC |
| |
| @{fail_list}= Create List |
| |
| ${user_info}= Create Dictionary |
| ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} |
| |
| FOR ${iter} IN RANGE ${1} ${iterations} + 1 |
| Log To Console ${iter}th iteration Post Request without valid session token |
| # Expected valid fail status response code. |
| Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} |
| ... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] |
| |
| # Every 100th iteration, check BMC allows post with auth token. |
| ${status}= Run Keyword If ${iter} % 100 == 0 Run Keyword And Return Status |
| ... Login And Create User |
| Run Keyword If ${status} == False Append To List ${fail_list} ${iter} |
| END |
| ${verify_count}= Evaluate ${iterations}/100 |
| ${fail_count}= Get Length ${fail_list} |
| |
| Should Be Equal As Integers ${fail_count} ${0} |
| ... msg=Post operation failed ${fail_count} times in ${verify_count} attempts; fails at iterations ${fail_list} |
| |
| |
| Make Large Number Of Wrong SSH Login Attempts And Check Stability |
| [Documentation] Check BMC stability with large number of SSH wrong login requests. |
| [Tags] Make_Large_Number_Of_Wrong_SSH_Login_Attempts_And_Check_Stability |
| [Setup] Set Account Lockout Threshold |
| [Teardown] FFDC On Test Case Fail |
| |
| SSHLibrary.Open Connection ${OPENBMC_HOST} |
| @{ssh_status_list}= Create List |
| FOR ${iter} IN RANGE ${loop_iteration} |
| Log To Console ${iter}th iteration |
| ${invalid_password}= Catenate ${OPENBMC_PASSWORD}${iter} |
| Run Keyword and Ignore Error |
| ... Open Connection And Log In ${OPENBMC_USERNAME} ${invalid_password} |
| |
| # Every 100th iteration Login with correct credentials |
| ${status}= Run keyword If ${iter} % ${100} == ${0} Run Keyword And Return Status |
| ... Open Connection And Log In ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} |
| Run Keyword If ${status} == ${False} Append To List ${ssh_status_list} ${status} |
| SSHLibrary.Close Connection |
| END |
| |
| ${valid_login_count}= Evaluate ${iterations}/100 |
| ${fail_count}= Get Length ${ssh_status_list} |
| Should Be Equal ${fail_count} ${0} |
| ... msg= Login Failed ${fail_count} times in ${valid_login_count} attempts. |
| |
| |
| Test Stability On Large Number Of Wrong Login Attempts To GUI |
| [Documentation] Test stability on large number of wrong login attempts to GUI. |
| [Tags] Test_Stability_On_Large_Number_Of_Wrong_Login_Attempts_To_GUI |
| |
| @{status_list}= Create List |
| |
| # Open headless browser. |
| Start Virtual Display |
| ${browser_ID}= Open Browser ${bmc_url} alias=browser1 |
| Set Window Size 1920 1080 |
| |
| Go To ${bmc_url} |
| |
| FOR ${iter} IN RANGE ${1} ${iterations} + 1 |
| Log To Console ${iter}th login |
| Run Keyword And Ignore Error Login to GUI With Incorrect Credentials |
| |
| # Every 100th iteration, check BMC GUI is responsive. |
| ${status}= Run Keyword If ${iter} % 100 == 0 Run Keyword And Return Status |
| ... Open Browser ${bmc_url} |
| Append To List ${status_list} ${status} |
| Run Keyword If '${status}' == 'True' |
| ... Run Keywords Close Browser AND Switch Browser browser1 |
| END |
| |
| ${fail_count}= Count Values In List ${status_list} False |
| Run Keyword If ${fail_count} > ${0} FAIL Could not open BMC GUI ${fail_count} times |
| |
| Test BMC GUI Stability On Continuous Refresh Of GUI Home Page |
| [Documentation] Login to BMC GUI and keep refreshing home page and verify stability |
| ... by login at times in another browser. |
| [Tags] Test_BMC_GUI_Stability_On_Continuous_Refresh_Of_GUI_Home_Page |
| [Teardown] Close All Browsers |
| |
| @{failed_list}= Create List |
| |
| # Open headless browser. |
| Start Virtual Display |
| ${browser_ID}= Open Browser ${bmc_url} alias=browser1 |
| Set Window Size 1920 1080 |
| Login GUI |
| |
| FOR ${iter} IN RANGE ${iterations} |
| Log To Console ${iter}th Refresh of home page |
| |
| Refresh GUI |
| Continue For Loop If ${iter}%100 != 0 |
| |
| # Every 100th iteration, check BMC GUI is responsive. |
| ${status}= Run Keyword And Return Status |
| ... Run Keywords Launch Browser And Login GUI AND Logout GUI |
| Run Keyword If '${status}' == 'False' Append To List ${failed_list} ${iter} |
| ... ELSE IF '${status}' == 'True' |
| ... Run Keywords Close Browser AND Switch Browser browser1 |
| END |
| Log ${failed_list} |
| ${fail_count}= Get Length ${failed_list} |
| Run Keyword If ${fail_count} > ${0} FAIL Could not open BMC GUI ${fail_count} times |
| |
| Test BMCweb Stability On Continuous Redfish Login Attempts With Invalid Credentials |
| [Documentation] Make invalid credentials Redfish login attempts continuously and |
| ... verify bmcweb stability by login to Redfish with valid credentials. |
| [Tags] Test_BMCweb_Stability_On_Continuous_Redfish_Login_Attempts_With_Invalid_Credentials |
| |
| Invalid Credentials Redfish Login Attempts |
| |
| Test User Delete Operation Without Session Token And Expect Failure |
| [Documentation] Try to delete an object without valid session token and verifies it throws |
| ... an unauthorised error. |
| [Tags] Test_User_Delete_Operation_Without_Session_Token_And_Expect_Failure |
| [Setup] Redfish.Logout |
| |
| Redfish.Delete /redfish/v1/AccountService/Accounts/test_user |
| ... valid_status_codes=[${HTTP_UNAUTHORIZED}] |
| |
| |
| Test Bmcweb Stability On Continuous Redfish Delete Operation Request Without Session Token |
| [Documentation] Send delete object request without valid session token continuously and |
| ... verify bmcweb stability by sending delete request with valid session token. |
| [Tags] Test_Bmcweb_Stability_On_Continuous_Redfish_Delete_Operation_Request_Without_Session_Token |
| |
| @{failed_iter_list}= Create List |
| |
| FOR ${iter} IN RANGE ${iterations} |
| Log To Console ${iter}th Redfish Delete Object Request without valid session token |
| |
| Run Keyword And Ignore Error |
| ... Redfish.Delete /redfish/v1/AccountService/Accounts/test_user |
| Continue For Loop If ${iter}%100 != 0 |
| |
| # Every 100th iteration, check delete operation with valid session token. |
| ${status}= Run Keyword And Return Status |
| ... Login And Delete User |
| Run Keyword If '${status}' == 'False' Append To List ${failed_iter_list} ${iter} |
| END |
| Log ${failed_iter_list} |
| ${fail_count}= Get Length ${failed_iter_list} |
| Run Keyword If ${fail_count} > ${0} FAIL Could not do Redfish delete operation ${fail_count} times |
| |
| *** Keywords *** |
| |
| Login And Configure Hostname |
| [Documentation] Login and configure hostname |
| [Arguments] ${ethernet_interface_uri} |
| [Teardown] Redfish.Logout |
| |
| # Description of argument(s): |
| # ethernet_interface_uri Network interface URI path. |
| |
| Redfish.Login |
| |
| Redfish.Patch ${ethernet_interface_uri} body={'HostName': '${hostname}'} |
| ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}] |
| |
| |
| Login And Create User |
| [Documentation] Login and create user |
| |
| [Teardown] Run Keywords Redfish.Delete /redfish/v1/AccountService/Accounts/test_user |
| ... AND Redfish.Logout |
| |
| Redfish.Login |
| |
| ${user_info}= Create Dictionary |
| ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} |
| Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} |
| ... valid_status_codes=[${HTTP_OK}, ${HTTP_CREATED}] |
| |
| Login And Delete User |
| [Documentation] Login create and delete user |
| |
| [Teardown] Redfish.Logout |
| |
| Redfish.Login |
| |
| ${user_info}= Create Dictionary |
| ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} |
| Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} |
| ... valid_status_codes=[${HTTP_OK}, ${HTTP_CREATED}] |
| Redfish.Delete /redfish/v1/AccountService/Accounts/test_user |
| |
| Set Account Lockout Threshold |
| [Documentation] Set user account lockout threshold. |
| |
| [Teardown] Redfish.Logout |
| |
| Redfish.Login |
| Redfish.Patch /redfish/v1/AccountService body=[('AccountLockoutThreshold', 0)] |
| |
| |
| Login to GUI With Incorrect Credentials |
| [Documentation] Attempt to login to GUI as root, providing incorrect password argument. |
| |
| Input Text ${xpath_textbox_username} root |
| Input Password ${xpath_textbox_password} incorrect_password |
| Click Button ${xpath_login_button} |
| |
| Invalid Credentials Redfish Login Attempts |
| [Documentation] Continuous invalid credentials login attempts to Redfish and |
| ... login to Redfish with valid credentials at times and get failed login attempts. |
| [Arguments] ${login_username}=${OPENBMC_USERNAME} ${login_password}=${OPENBMC_PASSWORD} |
| |
| # Description of argument(s): |
| # login_username username for login user. |
| # login_password password for login user. |
| |
| @{failed_iter_list}= Create List |
| |
| FOR ${iter} IN RANGE ${iterations} |
| Log To Console ${iter}th Redfish login with invalid credentials |
| Run Keyword And Ignore Error Redfish.Login ${login_username} incorrect_password |
| Continue For Loop If ${iter}%100 != 0 |
| |
| # Every 100th iteration, check Redfish is responsive. |
| ${status}= Run Keyword And Return Status |
| ... Redfish.Login ${login_username} ${login_password} |
| Run Keyword If '${status}' == 'False' Append To List ${failed_iter_list} ${iter} |
| Redfish.Logout |
| END |
| Log ${failed_iter_list} |
| ${fail_count}= Get Length ${failed_iter_list} |
| Run Keyword If ${fail_count} > ${0} FAIL Could not Login to Redfish ${fail_count} times |