IPMI/DCMI: Modified script based on user input
Changes:
- Modified script based on user input
Tested:
- Ran ipmi/ and ipmi/dcmi
Change-Id: Ic9d6e29ae199cffb6009e6718ae499293c319c96
Signed-off-by: Ishwarya Mathi M <ishwaryamm@ami.com>
diff --git a/ipmi/test_ipmi_payload.robot b/ipmi/test_ipmi_payload.robot
index 31db911..9d9ec82 100644
--- a/ipmi/test_ipmi_payload.robot
+++ b/ipmi/test_ipmi_payload.robot
@@ -285,7 +285,7 @@
${raw_command}= Catenate ${IPMI_RAW_CMD['Payload']['Get_User_Access_Payload'][0]}
... ${channel_number} ${user_id}
- ${resp}= Run External IPMI Raw Command ${raw_command}
+ ${resp}= Run IPMI Command ${raw_command}
[Return] ${resp}
@@ -345,7 +345,7 @@
# password The user password (e.g. "0penBmc", "0penBmc1", etc.).
# options Additional ipmitool command options (e.g "-L=Operator","-C=3").
- Wait Until Keyword Succeeds 15 sec 5 sec Run External IPMI Raw Command
+ Wait Until Keyword Succeeds 15 sec 5 sec Run IPMI Command
... ${IPMI_RAW_CMD['Device GUID']['Get'][0]} U=${username} P=${password} &{options}
@@ -476,7 +476,7 @@
${get_cmd}= Catenate ${IPMI_RAW_CMD['Payload']['Get_Channel_Payload_Version'][0]}
... ${channel_number} ${payload_type_number}
- ${resp}= Run External IPMI Raw Command ${get_cmd}
+ ${resp}= Run IPMI Command ${get_cmd}
${resp}= Strip String ${resp}
Should Be Equal ${resp} 10
END
@@ -529,7 +529,7 @@
... Verify Invalid IPMI Command ${raw_cmd} 0xcc
# will be executed only if invalid_channel == 0.
- ${resp}= Run External IPMI Raw Command ${raw_cmd}
+ ${resp}= Run IPMI Command ${raw_cmd}
${resp}= Strip String ${resp}
${expected_resp}= Catenate ${standard_payload_type_resp} ${session_setup_payload_resp} 00 00 00 00