blob: b188cc0be8fa3b026332d1da2ce73e5ab7ece325 [file] [log] [blame]
*** Settings ***
Documentation Connections and authentication module stability tests.
Resource ../lib/bmc_redfish_resource.robot
Resource ../lib/bmc_network_utils.robot
Resource ../lib/openbmc_ffdc.robot
Resource ../lib/resource.robot
Resource ../lib/utils.robot
Resource ../lib/connection_client.robot
Resource ../gui/lib/gui_resource.robot
Library ../lib/bmc_network_utils.py
Library SSHLibrary
Library Collections
Library XvfbRobot
Library OperatingSystem
Library SeleniumLibrary 120 120
Library Telnet 30 Seconds
Library Screenshot
Suite Setup Redfish.Logout
Variables ../gui/data/gui_variables.py
*** Variables ***
${iterations} 10000
${loop_iteration} ${1000}
${hostname} testhostname
${MAX_UNAUTH_PER_IP} ${5}
${bmc_url} https://${OPENBMC_HOST}
*** Test Cases ***
Test Patch Without Auth Token Fails
[Documentation] Send patch method without auth token and verify it throws an error.
[Tags] Test_Patch_Without_Auth_Token_Fails
${active_channel_config}= Get Active Channel Config
${ethernet_interface}= Set Variable ${active_channel_config['${CHANNEL_NUMBER}']['name']}
Redfish.Patch ${REDFISH_NW_ETH_IFACE}${ethernet_interface} body={'HostName': '${hostname}'}
... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
Flood Patch Without Auth Token And Check Stability Of BMC
[Documentation] Flood patch method without auth token and check BMC stability.
[Tags] Flood_Patch_Without_Auth_Token_And_Check_Stability_Of_BMC
@{fail_list}= Create List
${active_channel_config}= Get Active Channel Config
${ethernet_interface}= Set Variable ${active_channel_config['${CHANNEL_NUMBER}']['name']}
FOR ${iter} IN RANGE ${1} ${iterations} + 1
Log To Console ${iter}th iteration Patch Request without valid session token
# Expected valid fail status response code.
Redfish.Patch ${REDFISH_NW_ETH_IFACE}${ethernet_interface} body={'HostName': '${hostname}'}
... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
# Every 100th iteration, check BMC allows patch with auth token.
${status}= Run Keyword If ${iter} % 100 == 0 Run Keyword And Return Status
... Login And Configure Hostname ${REDFISH_NW_ETH_IFACE}${ethernet_interface}
Run Keyword If ${status} == False Append To List ${fail_list} ${iter}
END
${verify_count}= Evaluate ${iterations}/100
${fail_count}= Get Length ${fail_list}
Should Be Equal As Integers ${fail_count} ${0}
... msg=Patch operation failed ${fail_count} times in ${verify_count} attempts; fails at iterations ${fail_list}
Verify User Cannot Login After 5 Non-Logged In Sessions
[Documentation] User should not be able to login when there
... are 5 non-logged in sessions.
[Tags] Verify_User_Cannot_Login_After_5_Non-Logged_In_Sessions
FOR ${iter} IN RANGE ${0} ${MAX_UNAUTH_PER_IP}
SSHLibrary.Open Connection ${OPENBMC_HOST}
Start Process ssh ${OPENBMC_USERNAME}@${OPENBMC_HOST} shell=True
END
SSHLibrary.Open Connection ${OPENBMC_HOST}
${status}= Run Keyword And Return Status SSHLibrary.Login ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD}
Should Be Equal ${status} ${False}
Test Post Without Auth Token Fails
[Documentation] Send post method without auth token and verify it throws an error.
[Tags] Test_Post_Without_Auth_Token_Fails
${user_info}= Create Dictionary
... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True}
Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info}
... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
Flood Post Without Auth Token And Check Stability Of BMC
[Documentation] Flood post method without auth token and check BMC stability.
[Tags] Flood_Post_Without_Auth_Token_And_Check_Stability_Of_BMC
@{fail_list}= Create List
${user_info}= Create Dictionary
... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True}
FOR ${iter} IN RANGE ${1} ${iterations} + 1
Log To Console ${iter}th iteration Post Request without valid session token
# Expected valid fail status response code.
Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info}
... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
# Every 100th iteration, check BMC allows post with auth token.
${status}= Run Keyword If ${iter} % 100 == 0 Run Keyword And Return Status
... Login And Create User
Run Keyword If ${status} == False Append To List ${fail_list} ${iter}
END
${verify_count}= Evaluate ${iterations}/100
${fail_count}= Get Length ${fail_list}
Should Be Equal As Integers ${fail_count} ${0}
... msg=Post operation failed ${fail_count} times in ${verify_count} attempts; fails at iterations ${fail_list}
Make Large Number Of Wrong SSH Login Attempts And Check Stability
[Documentation] Check BMC stability with large number of SSH wrong login requests.
[Tags] Make_Large_Number_Of_Wrong_SSH_Login_Attempts_And_Check_Stability
[Setup] Set Account Lockout Threshold
[Teardown] FFDC On Test Case Fail
SSHLibrary.Open Connection ${OPENBMC_HOST}
@{ssh_status_list}= Create List
FOR ${iter} IN RANGE ${loop_iteration}
Log To Console ${iter}th iteration
${invalid_password}= Catenate ${OPENBMC_PASSWORD}${iter}
Run Keyword and Ignore Error
... Open Connection And Log In ${OPENBMC_USERNAME} ${invalid_password}
# Every 100th iteration Login with correct credentials
${status}= Run keyword If ${iter} % ${100} == ${0} Run Keyword And Return Status
... Open Connection And Log In ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD}
Run Keyword If ${status} == ${False} Append To List ${ssh_status_list} ${status}
SSHLibrary.Close Connection
END
${valid_login_count}= Evaluate ${iterations}/100
${fail_count}= Get Length ${ssh_status_list}
Should Be Equal ${fail_count} ${0}
... msg= Login Failed ${fail_count} times in ${valid_login_count} attempts.
Test Stability On Large Number Of Wrong Login Attempts To GUI
[Documentation] Test stability on large number of wrong login attempts to GUI.
[Tags] Test_Stability_On_Large_Number_Of_Wrong_Login_Attempts_To_GUI
@{status_list}= Create List
# Open headless browser.
Start Virtual Display
${browser_ID}= Open Browser ${bmc_url} alias=browser1
Set Window Size 1920 1080
Go To ${bmc_url}
FOR ${iter} IN RANGE ${1} ${iterations} + 1
Log To Console ${iter}th login
Run Keyword And Ignore Error Login to GUI With Incorrect Credentials
# Every 100th iteration, check BMC GUI is responsive.
${status}= Run Keyword If ${iter} % 100 == 0 Run Keyword And Return Status
... Open Browser ${bmc_url}
Append To List ${status_list} ${status}
Run Keyword If '${status}' == 'True'
... Run Keywords Close Browser AND Switch Browser browser1
END
${fail_count}= Count Values In List ${status_list} False
Run Keyword If ${fail_count} > ${0} FAIL Could not open BMC GUI ${fail_count} times
Test BMC GUI Stability On Continuous Refresh Of GUI Home Page
[Documentation] Login to BMC GUI and keep refreshing home page and verify stability
... by login at times in another browser.
[Tags] Test_BMC_GUI_Stability_On_Continuous_Refresh_Of_GUI_Home_Page
[Teardown] Close All Browsers
@{failed_list}= Create List
# Open headless browser.
Start Virtual Display
${browser_ID}= Open Browser ${bmc_url} alias=browser1
Set Window Size 1920 1080
Login GUI
FOR ${iter} IN RANGE ${iterations}
Log To Console ${iter}th Refresh of home page
Refresh GUI
Continue For Loop If ${iter}%100 != 0
# Every 100th iteration, check BMC GUI is responsive.
${status}= Run Keyword And Return Status
... Run Keywords Launch Browser And Login GUI AND Logout GUI
Run Keyword If '${status}' == 'False' Append To List ${failed_list} ${iter}
... ELSE IF '${status}' == 'True'
... Run Keywords Close Browser AND Switch Browser browser1
END
Log ${failed_list}
${fail_count}= Get Length ${failed_list}
Run Keyword If ${fail_count} > ${0} FAIL Could not open BMC GUI ${fail_count} times
Test BMCweb Stability On Continuous Redfish Login Attempts With Invalid Credentials
[Documentation] Make invalid credentials Redfish login attempts continuously and
... verify bmcweb stability by login to Redfish with valid credentials.
[Tags] Test_BMCweb_Stability_On_Continuous_Redfish_Login_Attempts_With_Invalid_Credentials
Invalid Credentials Redfish Login Attempts
Test User Delete Operation Without Session Token And Expect Failure
[Documentation] Try to delete an object without valid session token and verifies it throws
... an unauthorised error.
[Tags] Test_User_Delete_Operation_Without_Session_Token_And_Expect_Failure
[Setup] Redfish.Logout
Redfish.Delete /redfish/v1/AccountService/Accounts/test_user
... valid_status_codes=[${HTTP_UNAUTHORIZED}]
Test Bmcweb Stability On Continuous Redfish Delete Operation Request Without Session Token
[Documentation] Send delete object request without valid session token continuously and
... verify bmcweb stability by sending delete request with valid session token.
[Tags] Test_Bmcweb_Stability_On_Continuous_Redfish_Delete_Operation_Request_Without_Session_Token
@{failed_iter_list}= Create List
FOR ${iter} IN RANGE ${iterations}
Log To Console ${iter}th Redfish Delete Object Request without valid session token
Run Keyword And Ignore Error
... Redfish.Delete /redfish/v1/AccountService/Accounts/test_user
Continue For Loop If ${iter}%100 != 0
# Every 100th iteration, check delete operation with valid session token.
${status}= Run Keyword And Return Status
... Login And Delete User
Run Keyword If '${status}' == 'False' Append To List ${failed_iter_list} ${iter}
END
Log ${failed_iter_list}
${fail_count}= Get Length ${failed_iter_list}
Run Keyword If ${fail_count} > ${0} FAIL Could not do Redfish delete operation ${fail_count} times
*** Keywords ***
Login And Configure Hostname
[Documentation] Login and configure hostname
[Arguments] ${ethernet_interface_uri}
[Teardown] Redfish.Logout
# Description of argument(s):
# ethernet_interface_uri Network interface URI path.
Redfish.Login
Redfish.Patch ${ethernet_interface_uri} body={'HostName': '${hostname}'}
... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}]
Login And Create User
[Documentation] Login and create user
[Teardown] Run Keywords Redfish.Delete /redfish/v1/AccountService/Accounts/test_user
... AND Redfish.Logout
Redfish.Login
${user_info}= Create Dictionary
... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True}
Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info}
... valid_status_codes=[${HTTP_OK}, ${HTTP_CREATED}]
Login And Delete User
[Documentation] Login create and delete user
[Teardown] Redfish.Logout
Redfish.Login
${user_info}= Create Dictionary
... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True}
Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info}
... valid_status_codes=[${HTTP_OK}, ${HTTP_CREATED}]
Redfish.Delete /redfish/v1/AccountService/Accounts/test_user
Set Account Lockout Threshold
[Documentation] Set user account lockout threshold.
[Teardown] Redfish.Logout
Redfish.Login
Redfish.Patch /redfish/v1/AccountService body=[('AccountLockoutThreshold', 0)]
Login to GUI With Incorrect Credentials
[Documentation] Login to GUI with wrong credentials.
Input Text ${xpath_textbox_username} root
Input Password ${xpath_textbox_password} incorrect_password
Click Button ${xpath_login_button}
Invalid Credentials Redfish Login Attempts
[Documentation] Continuous invalid credentials login attempts to Redfish and
... login to Redfish with valid credentials at times and get failed login attempts.
[Arguments] ${login_username}=${OPENBMC_USERNAME} ${login_password}=${OPENBMC_PASSWORD}
# Description of argument(s):
# login_username username for login user.
# login_password password for login user.
@{failed_iter_list}= Create List
FOR ${iter} IN RANGE ${iterations}
Log To Console ${iter}th Redfish login with invalid credentials
Run Keyword And Ignore Error Redfish.Login ${login_username} incorrect_password
Continue For Loop If ${iter}%100 != 0
# Every 100th iteration, check Redfish is responsive.
${status}= Run Keyword And Return Status
... Redfish.Login ${login_username} ${login_password}
Run Keyword If '${status}' == 'False' Append To List ${failed_iter_list} ${iter}
Redfish.Logout
END
Log ${failed_iter_list}
${fail_count}= Get Length ${failed_iter_list}
Run Keyword If ${fail_count} > ${0} FAIL Could not Login to Redfish ${fail_count} times