blob: 4158f95914c9075f8b4dccd8afe92fa6639c5d84 [file] [log] [blame]
*** Settings ***
Documentation Network stack stress tests using "nping" tool.
# This Suite has few testcases which uses nping with ICMP.
# ICMP creates a raw socket, which requires root privilege/sudo to run tests.
Resource ../lib/resource.robot
Resource ../lib/bmc_redfish_resource.robot
Resource ../lib/ipmi_client.robot
Resource ../lib/bmc_network_security_utils.robot
Library OperatingSystem
Library String
Library ../lib/gen_robot_valid.py
Library ../lib/bmc_network_utils.py
Library ../lib/ipmi_utils.py
Suite Setup Suite Setup Execution
Force Tags Network_Nping
*** Variables ***
${delay} 1000ms
${count} 4
${program_name} nping
${iterations} 5000
*** Test Cases ***
Send ICMP Timestamp Request
[Documentation] Send ICMP packet type 13 and check BMC drops such packets
[Tags] Send_ICMP_Timestamp_Request
# Send ICMP packet type 13 to BMC and check packet loss.
${packet_loss}= Send Network Packets And Get Packet Loss
... ${OPENBMC_HOST} ${count} ${ICMP_PACKETS} ${NETWORK_PORT} ${ICMP_TIMESTAMP_REQUEST}
Should Be Equal As Numbers ${packet_loss} 100.00
... msg=FAILURE: BMC is not dropping timestamp request messages.
Send ICMP Netmask Request
[Documentation] Send ICMP packet type 17 and check BMC drops such packets
[Tags] Send_ICMP_Netmask_Request
# Send ICMP packet type 17 to BMC and check packet loss.
${packet_loss}= Send Network Packets And Get Packet Loss
... ${OPENBMC_HOST} ${count} ${ICMP_PACKETS} ${NETWORK_PORT} ${ICMP_NETMASK_REQUEST}
Should Be Equal As Numbers ${packet_loss} 100.00
... msg=FAILURE: BMC is not dropping netmask request messages.
Send Continuous ICMP Echo Request To BMC And Verify No Packet Loss
[Documentation] Send ICMP packet type 8 continuously and check no packets are dropped from BMC
[Tags] Send_Continuous_ICMP_Echo_Request_To_BMC_And_Verify_No_Packet_Loss
# Send ICMP packet type 8 to BMC and check packet loss.
${packet_loss}= Send Network Packets And Get Packet Loss
... ${OPENBMC_HOST} ${iterations} ${ICMP_PACKETS}
Should Be Equal As Numbers ${packet_loss} 0.0
... msg=FAILURE: BMC is dropping packets.
Send Network Packets Continuously To Redfish Interface
[Documentation] Send network packets continuously to Redfish interface and verify stability.
[Tags] Send_Network_Packets_Continuously_To_Redfish_Interface
# Send large number of packets to Redfish interface.
${packet_loss}= Send Network Packets And Get Packet Loss
... ${OPENBMC_HOST} ${iterations} ${TCP_PACKETS} ${REDFISH_INTERFACE}
Should Be Equal As Numbers ${packet_loss} 0.0
... msg=FAILURE: BMC is dropping some packets.
# Check if Redfish interface is functional.
Redfish.Login
Redfish.Logout
Send Network Packets Continuously To IPMI Port
[Documentation] Send network packets continuously to IPMI port and verify stability.
[Tags] Send_Network_Packets_Continuously_To_IPMI_Port
# Send large number of packets to IPMI port.
${packet_loss}= Send Network Packets And Get Packet Loss
... ${OPENBMC_HOST} ${iterations} ${TCP_PACKETS} ${IPMI_PORT}
Should Be Equal As Numbers ${packet_loss} 0.0
... msg=FAILURE: BMC is dropping some packets.
# Check if IPMI interface is functional.
Run IPMI Standard Command chassis status
Send Network Packets Continuously To SSH Port
[Documentation] Send network packets continuously to SSH port and verify stability.
[Tags] Send_Network_Packets_Continuously_To_SSH_Port
# Send large number of packets to SSH port.
${packet_loss}= Send Network Packets And Get Packet Loss
... ${OPENBMC_HOST} ${iterations} ${TCP_PACKETS} ${SSH_PORT}
Should Be Equal As Numbers ${packet_loss} 0.0
... msg=FAILURE: BMC is dropping some packets.
# Check if SSH interface is functional.
SSHLibrary.Open Connection ${OPENBMC_HOST}
Open Connection And Log In ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD}
Flood Redfish Interface With Packets With Flags And Check Stability
[Documentation] Send large number of packets with flags to Redfish interface
... and check stability.
[Tags] Flood_Redfish_Interface_With_Packets_With_Flags_And_Check_Stability
[Template] Send Network Packets With Flags And Verify Stability
# Target No. Of packets Interface Flags
# Flood syn packets and check BMC behavior.
${OPENBMC_HOST} ${iterations} ${REDFISH_INTERFACE} ${SYN_PACKETS}
# Flood reset packets and check BMC behavior.
${OPENBMC_HOST} ${iterations} ${REDFISH_INTERFACE} ${RESET_PACKETS}
# Flood fin packets and check BMC behavior.
${OPENBMC_HOST} ${iterations} ${REDFISH_INTERFACE} ${FIN_PACKETS}
# Flood syn ack reset packets and check BMC behavior.
${OPENBMC_HOST} ${iterations} ${REDFISH_INTERFACE} ${SYN_ACK_RESET}
# Flood packets with all flags and check BMC behavior.
${OPENBMC_HOST} ${iterations} ${REDFISH_INTERFACE} ${ALL_FLAGS}
*** Keywords ***
Suite Setup Execution
[Documentation] Validate the setup.
Valid Value OPENBMC_HOST
Valid Program program_name
Verify Interface Stability
[Documentation] Verify interface is up and active.
[Arguments] ${port}
# Description of argument(s):
# port Network port.
Run Keyword If ${port} == ${REDFISH_INTERFACE}
... Redfish.Login
... ELSE IF ${port} == ${SSH_PORT}
... Open Connection And Log In ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD}
... ELSE IF ${port} == ${IPMI_PORT}
... Run External IPMI Standard Command lan print
... ELSE IF ${port} == ${HOST_SOL_PORT}
... Open Connection And Log In ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} port=${HOST_SOL_PORT}
... ELSE
... Redfish.Login