IPMI: no_access privilege has been removed from IPMI scripts
Changes:
- In test_ipmi_user.robot removed Test_IPMI_No_Access_Privilege_Level testcase and renamed no_access as user privilege in
Verify_Administrator_And_No_Access_Privilege_For_Different_Channels
- In test_ipmi_payload.robot removed no_access privilege
Tested:
- Ran ipmi/test_ipmi_user.robot and ipmi/test_ipmi_payload.robot scripts Successfully
Change-Id: I604ad76c4e94df085fcada66578a047eb8c477d7
Signed-off-by: ganesanb <ganesanb@ami.com>
diff --git a/ipmi/test_ipmi_payload.robot b/ipmi/test_ipmi_payload.robot
index dcab815..31db911 100644
--- a/ipmi/test_ipmi_payload.robot
+++ b/ipmi/test_ipmi_payload.robot
@@ -17,7 +17,6 @@
${user_priv} 2
${operator_priv} 3
${admin_level_priv} 4
-${no_access_priv} 15
${new_user_passwd} 0penBmc1
${standard_payload_type_resp} 03 00
${session_setup_payload_resp} 3f 00
diff --git a/ipmi/test_ipmi_user.robot b/ipmi/test_ipmi_user.robot
index be63b6e..32f1db3 100644
--- a/ipmi/test_ipmi_user.robot
+++ b/ipmi/test_ipmi_user.robot
@@ -22,7 +22,6 @@
${user_priv} 2
${operator_priv} 3
${admin_level_priv} 4
-${no_access_priv} 15
${valid_password} 0penBmc1
${max_password_length} 20
${ipmi_setaccess_cmd} channel setaccess
@@ -285,17 +284,6 @@
${admin_level_priv} Passed Passed Passed
-Test IPMI No Access Privilege Level
- [Documentation] Verify IPMI user with no access privilege can not run command at any level.
- [Tags] Test_IPMI_No_Access_Privilege_Level
- [Template] Test IPMI User Privilege
- [Teardown] Run Keywords FFDC On Test Case Fail AND
- ... Delete Created User ${random_userid}
-
- #Privilege level User Cmd Status Operator Cmd Status Admin Cmd Status
- ${no_access_priv} Failed Failed Failed
-
-
Enable IPMI User And Verify
[Documentation] Enable IPMI user and verify that the user is able
... to run IPMI command.
@@ -369,9 +357,9 @@
... root ${valid_password}
-Verify Administrator And No Access Privilege For Different Channels
- [Documentation] Set administrator and no access privilege for different channels and verify.
- [Tags] Verify_Administrator_And_No_Access_Privilege_For_Different_Channels
+Verify Administrator And User Privilege For Different Channels
+ [Documentation] Set administrator and user privilege for different channels and verify.
+ [Tags] Verify_Administrator_And_User_Privilege_For_Different_Channels
[Setup] Check Active Ethernet Channels
[Teardown] Run Keywords FFDC On Test Case Fail AND
... Delete Created User ${random_userid}
@@ -384,8 +372,8 @@
# Set admin privilege for newly created user with channel 1.
Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv} ${CHANNEL_NUMBER}
- # Set no access privilege for newly created user with channel 2.
- Set Channel Access ${random_userid} ipmi=on privilege=${no_access_priv} ${secondary_channel_number}
+ # Set user privilege for newly created user with channel 2.
+ Set Channel Access ${random_userid} ipmi=on privilege=${user_priv} ${secondary_channel_number}
Enable IPMI User And Verify ${random_userid}