Added new cases for IPMI Set User access payload.
Testcases Added:
1) Verify Set User Access Payload For Standard Payload SOL
Disable standard payload 1(SOL) using set user access payload command
and verify it in get user access payload command and also check
sol activate is not working.
2) Verify Set User Access Payload For Operator Privileged User
Verify set user access payload command is not accessbile for Operator
privileged User.
Moved below keywords from ipmi/test_ipmi_user.robot to lib/ipmi_client.robot
for reuse purpose.
Enable IPMI User And Verify
Create Random IPMI User
Delete Created User
Added IPMI raw cmd for Set user access payload.
Tested: Run robot ipmi/test_ipmi_paylaod.robot.
Signed-off-by: Nagarjun B <nagarjunb@ami.com>
Change-Id: I8c7f3b0e46895fad0f6483043f76b714152a85be
diff --git a/lib/ipmi_client.robot b/lib/ipmi_client.robot
index 52e46c7..f856bf4 100755
--- a/lib/ipmi_client.robot
+++ b/lib/ipmi_client.robot
@@ -404,6 +404,37 @@
Should Be Equal ${user_info['user_name']} ${username}
+Enable IPMI User And Verify
+ [Documentation] Enable the userid and verify that it has been enabled.
+ [Arguments] ${userid}
+
+ # Description of argument(s):
+ # userid A numeric userid (e.g. "4").
+
+ Run IPMI Standard Command user enable ${userid}
+ ${user_info}= Get User Info ${userid}
+ Valid Value user_info['enable_status'] ['enabled']
+
+
+Create Random IPMI User
+ [Documentation] Create IPMI user with random username and userid and return those fields.
+
+ ${random_username}= Generate Random String 8 [LETTERS]
+ ${random_userid}= Evaluate random.randint(2, 15) modules=random
+ IPMI Create User ${random_userid} ${random_username}
+ [Return] ${random_userid} ${random_username}
+
+
+Delete Created User
+ [Documentation] Delete created IPMI user.
+ [Arguments] ${userid}
+ # Description of argument(s):
+ # userid The user ID (e.g. "1", "2", etc.).
+
+ Run IPMI Standard Command user set name ${userid} ""
+ Sleep 5s
+
+
Set Channel Access
[Documentation] Verify that user is able to run IPMI command
... with given username and password.
@@ -572,4 +603,4 @@
${resp}= Run External IPMI Raw Command ${ipmi_cmd} fail_on_err=0
- Should Contain ${resp} rsp=${error_code}
+ Should Contain ${resp} rsp=${error_code}
\ No newline at end of file