Update SSH command to bypass prompt
Changes:
- Move security directory.
- Add paramter to bypass key checking
Change-Id: I9b80ff242f53c1096d831ab144f5b14f556917e0
Signed-off-by: George Keishing <gkeishin@in.ibm.com>
diff --git a/redfish/security/test_bmc_ssh_security.robot b/security/test_bmc_ssh_security.robot
similarity index 93%
rename from redfish/security/test_bmc_ssh_security.robot
rename to security/test_bmc_ssh_security.robot
index a88fb70..6c01096 100644
--- a/redfish/security/test_bmc_ssh_security.robot
+++ b/security/test_bmc_ssh_security.robot
@@ -1,8 +1,8 @@
*** Settings ***
Documentation Test BMC SSH security.
-Resource ../../lib/resource.robot
-Resource ../../lib/openbmc_ffdc_methods.robot
+Resource ../lib/resource.robot
+Resource ../lib/openbmc_ffdc_methods.robot
*** Variables ***
@@ -49,6 +49,7 @@
# - KEX: diffie-hellman-group1(any) , (any) SHA1
Printn
- ${ssh_cmd_buf}= Catenate ssh -o NumberOfPasswordPrompts=0 -vv ${OPENBMC_HOST} 2>&1
+ ${ssh_cmd_buf}= Catenate ssh -o NumberOfPasswordPrompts=0 UserKnownHostsFile=/dev/null
+ ... StrictHostKeyChecking=no -vv ${OPENBMC_HOST} 2>&1
Shell Cmd ! ${ssh_cmd_buf} | egrep -- "${weak_key_regex}"
Shell Cmd ! ${ssh_cmd_buf} | egrep -- "${mac_key_regex}"