| *** Settings *** |
| Documentation Connections and authentication module stability tests. |
| |
| Resource ../lib/bmc_redfish_resource.robot |
| Resource ../lib/bmc_network_utils.robot |
| Resource ../lib/openbmc_ffdc.robot |
| Resource ../lib/resource.robot |
| Resource ../lib/utils.robot |
| Resource ../lib/connection_client.robot |
| Resource ../gui/lib/gui_resource.robot |
| Library ../lib/bmc_network_utils.py |
| |
| Library SSHLibrary |
| Library Collections |
| Library XvfbRobot |
| Library OperatingSystem |
| Library SeleniumLibrary 120 120 |
| Library Telnet 30 Seconds |
| Library Screenshot |
| |
| |
| Suite Setup Redfish.Logout |
| |
| Variables ../gui/data/gui_variables.py |
| |
| *** Variables *** |
| |
| ${iterations} 10000 |
| ${loop_iteration} ${1000} |
| ${hostname} test_hostname |
| ${MAX_UNAUTH_PER_IP} ${5} |
| ${bmc_url} https://${OPENBMC_HOST} |
| |
| |
| *** Test Cases *** |
| |
| Test Patch Without Auth Token Fails |
| [Documentation] Send patch method without auth token and verify it throws an error. |
| [Tags] Test_Patch_Without_Auth_Token_Fails |
| |
| ${active_channel_config}= Get Active Channel Config |
| ${ethernet_interface}= Set Variable ${active_channel_config['${CHANNEL_NUMBER}']['name']} |
| |
| Redfish.Patch ${REDFISH_NW_ETH_IFACE}${ethernet_interface} body={'HostName': '${hostname}'} |
| ... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] |
| |
| |
| Flood Patch Without Auth Token And Check Stability Of BMC |
| [Documentation] Flood patch method without auth token and check BMC stability. |
| [Tags] Flood_Patch_Without_Auth_Token_And_Check_Stability_Of_BMC |
| @{status_list}= Create List |
| |
| ${active_channel_config}= Get Active Channel Config |
| ${ethernet_interface}= Set Variable ${active_channel_config['${CHANNEL_NUMBER}']['name']} |
| |
| FOR ${i} IN RANGE ${1} ${iterations} |
| Log To Console ${i}th iteration |
| Run Keyword And Ignore Error |
| ... Redfish.Patch ${REDFISH_NW_ETH_IFACE}${ethernet_interface} body={'HostName': '${hostname}'} |
| |
| # Every 100th iteration, check BMC allows patch with auth token. |
| ${status}= Run Keyword If ${i} % 100 == 0 Run Keyword And Return Status |
| ... Login And Configure Hostname |
| Run Keyword If ${status} == False Append To List ${status_list} ${status} |
| END |
| ${verify_count}= Evaluate ${iterations}/100 |
| ${fail_count}= Get Length ${status_list} |
| |
| Should Be Equal ${fail_count} 0 |
| ... msg=Patch operation failed ${fail_count} times in ${verify_count} attempts |
| |
| |
| Verify User Cannot Login After 5 Non-Logged In Sessions |
| [Documentation] User should not be able to login when there |
| ... are 5 non-logged in sessions. |
| [Tags] Verify_User_Cannot_Login_After_5_Non-Logged_In_Sessions |
| |
| FOR ${i} IN RANGE ${0} ${MAX_UNAUTH_PER_IP} |
| SSHLibrary.Open Connection ${OPENBMC_HOST} |
| Start Process ssh ${OPENBMC_USERNAME}@${OPENBMC_HOST} shell=True |
| END |
| |
| SSHLibrary.Open Connection ${OPENBMC_HOST} |
| ${status}= Run Keyword And Return Status SSHLibrary.Login ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} |
| |
| Should Be Equal ${status} ${False} |
| |
| |
| Test Post Without Auth Token Fails |
| [Documentation] Send post method without auth token and verify it throws an error. |
| [Tags] Test_Post_Without_Auth_Token_Fails |
| |
| ${user_info}= Create Dictionary |
| ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} |
| Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} |
| ... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] |
| |
| |
| Flood Post Without Auth Token And Check Stability Of BMC |
| [Documentation] Flood post method without auth token and check BMC stability. |
| [Tags] Flood_Post_Without_Auth_Token_And_Check_Stability_Of_BMC |
| |
| @{status_list}= Create List |
| ${user_info}= Create Dictionary |
| ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} |
| |
| FOR ${i} IN RANGE ${1} ${iterations} |
| Log To Console ${i}th iteration |
| Run Keyword And Ignore Error |
| ... Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} |
| |
| # Every 100th iteration, check BMC allows post with auth token. |
| ${status}= Run Keyword If ${i} % 100 == 0 Run Keyword And Return Status |
| ... Login And Create User |
| Run Keyword If ${status} == False Append To List ${status_list} ${status} |
| END |
| ${verify_count}= Evaluate ${iterations}/100 |
| ${fail_count}= Get Length ${status_list} |
| |
| Should Be Equal ${fail_count} 0 |
| ... msg=Post operation failed ${fail_count} times in ${verify_count} attempts |
| |
| |
| Make Large Number Of Wrong SSH Login Attempts And Check Stability |
| [Documentation] Check BMC stability with large number of SSH wrong login requests. |
| [Tags] Make_Large_Number_Of_Wrong_SSH_Login_Attempts_And_Check_Stability |
| [Setup] Set Account Lockout Threshold |
| [Teardown] FFDC On Test Case Fail |
| |
| SSHLibrary.Open Connection ${OPENBMC_HOST} |
| @{ssh_status_list}= Create List |
| FOR ${i} IN RANGE ${loop_iteration} |
| Log To Console ${i}th iteration |
| ${invalid_password}= Catenate ${OPENBMC_PASSWORD}${i} |
| Run Keyword and Ignore Error |
| ... Open Connection And Log In ${OPENBMC_USERNAME} ${invalid_password} |
| |
| # Every 100th iteration Login with correct credentials |
| ${status}= Run keyword If ${i} % ${100} == ${0} Run Keyword And Return Status |
| ... Open Connection And Log In ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} |
| Run Keyword If ${status} == ${False} Append To List ${ssh_status_list} ${status} |
| SSHLibrary.Close Connection |
| END |
| |
| ${valid_login_count}= Evaluate ${iterations}/100 |
| ${fail_count}= Get Length ${ssh_status_list} |
| Should Be Equal ${fail_count} ${0} |
| ... msg= Login Failed ${fail_count} times in ${valid_login_count} attempts. |
| |
| |
| Test Stability On Large Number Of Wrong Login Attempts To GUI |
| [Documentation] Test stability on large number of wrong login attempts to GUI. |
| [Tags] Test_Stability_On_Large_Number_Of_Wrong_Login_Attempts_To_GUI |
| |
| @{status_list}= Create List |
| |
| # Open headless browser. |
| Start Virtual Display |
| ${browser_ID}= Open Browser ${bmc_url} alias=browser1 |
| Set Window Size 1920 1080 |
| |
| Go To ${bmc_url} |
| |
| FOR ${i} IN RANGE ${1} ${iterations} |
| Log To Console ${i}th login |
| Run Keyword And Ignore Error Login to GUI With Wrong Credentials |
| |
| # Every 100th iteration, check BMC GUI is responsive. |
| ${status}= Run Keyword If ${i} % 100 == 0 Run Keyword And Return Status |
| ... Open Browser ${bmc_url} |
| Append To List ${status_list} ${status} |
| Run Keyword If '${status}' == 'True' |
| ... Run Keywords Close Browser AND Switch Browser browser1 |
| END |
| |
| ${fail_count}= Count Values In List ${status_list} False |
| Run Keyword If ${fail_count} > ${0} FAIL Could not open BMC GUI ${fail_count} times |
| |
| Test BMC GUI Stability On Continuous Refresh Of GUI Home Page |
| [Documentation] Login to BMC GUI and keep refreshing home page and verify stability |
| ... by login at times in another browser. |
| [Tags] Test_BMC_GUI_Stability_On_Continuous_Refresh_Of_GUI_Home_Page |
| [Teardown] Close All Browsers |
| |
| @{failed_list}= Create List |
| |
| # Open headless browser. |
| Start Virtual Display |
| ${browser_ID}= Open Browser ${bmc_url} alias=browser1 |
| Set Window Size 1920 1080 |
| Login GUI |
| |
| FOR ${iter} IN RANGE ${iterations} |
| Log To Console ${iter}th Refresh of home page |
| |
| Refresh GUI |
| Continue For Loop If ${iter}%100 != 0 |
| |
| # Every 100th iteration, check BMC GUI is responsive. |
| ${status}= Run Keyword And Return Status |
| ... Run Keywords Launch Browser And Login GUI AND Logout GUI |
| Run Keyword If '${status}' == 'False' Append To List ${failed_list} ${iter} |
| ... ELSE IF '${status}' == 'True' |
| ... Run Keywords Close Browser AND Switch Browser browser1 |
| END |
| Log ${failed_list} |
| ${fail_count}= Get Length ${failed_list} |
| Run Keyword If ${fail_count} > ${0} FAIL Could not open BMC GUI ${fail_count} times |
| |
| *** Keywords *** |
| |
| Login And Configure Hostname |
| [Documentation] Login and configure hostname |
| |
| [Teardown] Redfish.Logout |
| |
| Redfish.Login |
| |
| Redfish.patch ${REDFISH_NW_PROTOCOL_URI} body={'HostName': '${hostname}'} |
| ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}] |
| |
| |
| Login And Create User |
| [Documentation] Login and create user |
| |
| [Teardown] Redfish.Logout |
| |
| Redfish.Login |
| |
| ${user_info}= Create Dictionary |
| ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} |
| Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} |
| ... valid_status_codes=[${HTTP_OK}] |
| |
| |
| Set Account Lockout Threshold |
| [Documentation] Set user account lockout threshold. |
| |
| [Teardown] Redfish.Logout |
| |
| Redfish.Login |
| Redfish.Patch /redfish/v1/AccountService body=[('AccountLockoutThreshold', 0)] |
| |
| |
| Login to GUI With Incorrect Credentials |
| [Documentation] Login to GUI With Wrong Credentials. |
| |
| Input Text ${xpath_textbox_username} root |
| Input Password ${xpath_textbox_password} incorrect_password |
| Click Button ${xpath_login_button} |