Added test to verify modified IPMI username
Test cases added:
- Modify_IPMI_User
It will create a new user and set access, change previlege
and change the username and verify the modified username is accessible.
verifies modified IPMI user is communicating via IPMI.
Tested: Run robot "Modify_IPMI_User" of ipmi/test_ipmi_user.robot
Signed-off-by: Chithra Gopinathan <chithrag@ami.com>
Change-Id: I712da488422084c857fb54fb70fdac7804add656
diff --git a/ipmi/test_ipmi_user.robot b/ipmi/test_ipmi_user.robot
index a2878f3..5242a50 100644
--- a/ipmi/test_ipmi_user.robot
+++ b/ipmi/test_ipmi_user.robot
@@ -12,6 +12,7 @@
${invalid_username} user%
${invalid_password} abc123
+${new_username} newuser
${root_userid} 1
${operator_level_priv} 0x3
${user_priv} 2
@@ -478,6 +479,36 @@
END
+Modify IPMI User
+ [Documentation] Verify modified IPMI user is communicating via IPMI.
+ [Tags] Modify_IPMI_User
+ [Teardown] Run Keywords FFDC On Test Case Fail AND
+ ... Delete Created User ${random_userid}
+
+ ${random_userid} ${random_username}= Create Random IPMI User
+ Set Test Variable ${random_userid}
+ Run IPMI Standard Command
+ ... user set password ${random_userid} ${valid_password}
+
+ # Set admin privilege and enable IPMI messaging for newly created user.
+ Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv}
+
+ # Delay added for user privilege to get set.
+ Sleep 5s
+
+ Enable IPMI User And Verify ${random_userid}
+
+ # Verify that user is able to run administrator level IPMI command.
+ Verify IPMI Command ${random_username} ${valid_password} Administrator ${CHANNEL_NUMBER}
+
+ # Set different username for same IPMI user.
+ Run IPMI Standard Command
+ ... user set name ${random_userid} ${new_username}
+
+ # Verify that user is able to run administrator level IPMI command.
+ Verify IPMI Command ${new_username} ${valid_password} Administrator ${CHANNEL_NUMBER}
+
+
*** Keywords ***
Create Random IPMI User