User: Remove NoAccess privilege cases and fix typo
Changes:
- Remove NoAccess test cases for LDAP web due to:
https://gerrit.openbmc.org/c/openbmc/bmcweb/+/52365
- Fix typo for patching redfish attribute AccountLockoutThreshold
Tested:
- Ran-- dryrun gui/gui_test/security_and_access_menu/
- Ran --dryrun redfish/account_service/test_ldap_configuration.robot
Change-Id: I8d5efd8256b66ca834e9cdd18c83a98f3a844dda
Signed-off-by: Wilson Suen <wilsons@supermicro.com>
diff --git a/gui/gui_test/security_and_access_menu/test_ldap_sub_menu.robot b/gui/gui_test/security_and_access_menu/test_ldap_sub_menu.robot
index a7990e1..ceb0e45 100644
--- a/gui/gui_test/security_and_access_menu/test_ldap_sub_menu.robot
+++ b/gui/gui_test/security_and_access_menu/test_ldap_sub_menu.robot
@@ -167,7 +167,6 @@
${GROUP_NAME} Administrator ${HTTP_OK}
${GROUP_NAME} Operator ${HTTP_OK}
${GROUP_NAME} ReadOnly ${HTTP_OK}
- ${GROUP_NAME} NoAccess ${HTTP_FORBIDDEN}
Verify LDAP Login Fails On Wrong LDAP Port
@@ -283,7 +282,7 @@
# Description of argument(s):
# group_name The group name of LDAP user.
# group_privilege The group privilege for LDAP user
- # (e.g. "Administrator", "Operator", "ReadOnly" or "NoAcccess").
+ # (e.g. "Administrator", "Operator" or "ReadOnly").
Create LDAP Configuration
Click Element ${xpath_add_role_group_button}
@@ -355,7 +354,7 @@
... AND Delete LDAP Role Group ${group_name}
# Description of argument(s):
- # group_privilege The group privilege ("Administrator", "Operator", "ReadOnly" or "NoAccess").
+ # group_privilege The group privilege ("Administrator", "Operator" or "ReadOnly").
# group_name The group name of user.
# valid_status_code The expected valid status code.
diff --git a/gui/gui_test/security_and_access_menu/test_user_management_sub_menu.robot b/gui/gui_test/security_and_access_menu/test_user_management_sub_menu.robot
index a3f392f..674e487 100644
--- a/gui/gui_test/security_and_access_menu/test_user_management_sub_menu.robot
+++ b/gui/gui_test/security_and_access_menu/test_user_management_sub_menu.robot
@@ -116,15 +116,14 @@
${username}[2] Administrator ${False}
-Verify Operator And No Access User Privilege
+Verify Operator User Privilege
[Documentation] Create users with different access privilege
... and verify that the user is getting created.
- [Tags] Verify_Operator_And_No_Access_User_Privilege
+ [Tags] Verify_Operator_User_Privilege
[Template] Create User And Verify
# username privilege_level enabled
operator_user Operator ${True}
- noaccess_user NoAccess ${True}
Verify User Account And Properties Saved Through Reboots
diff --git a/redfish/account_service/test_ldap_configuration.robot b/redfish/account_service/test_ldap_configuration.robot
index efa180f..d484900 100644
--- a/redfish/account_service/test_ldap_configuration.robot
+++ b/redfish/account_service/test_ldap_configuration.robot
@@ -621,7 +621,7 @@
Redfish.Patch ${REDFISH_BASE_URI}AccountService
... body=[('AccountLockoutDuration', ${old_account_service['AccountLockoutDuration']})]
Redfish.Patch ${REDFISH_BASE_URI}AccountService
- ... body=[('AccountLockoutDuration', ${old_account_service['AccountLockoutThreshold']})]
+ ... body=[('AccountLockoutThreshold', ${old_account_service['AccountLockoutThreshold']})]
Suite Setup Execution