blob: b44930c1d2e921b5d81bc078a5a27634c70e90fb [file] [log] [blame]
*** Settings ***
Documentation Test IPMI and Redfish combinations for user management.
Resource ../../lib/openbmc_ffdc.robot
Resource ../../lib/ipmi_client.robot
Resource ../../lib/resource.robot
Resource ../../lib/bmc_redfish_resource.robot
Resource ../../lib/openbmc_ffdc.robot
Resource ../../lib/ipmi_client.robot
Library ../../lib/ipmi_utils.py
Test Setup Test Setup Execution
Test Teardown Test Teardown Execution
*** Variables ***
${valid_password} 0penBmc1
${valid_password2} 0penBmc2
*** Test Cases ***
Create IPMI User Without Any Privilege And Verify Via Redfish
[Documentation] Create user using IPMI without privilege and verify user privilege
... via Redfish.
[Tags] Create_IPMI_User_Without_Any_Privilege_And_Verify_Via_Redfish
# Create IPMI user with random id and username.
${random_userid}= Evaluate random.randint(2, 15) modules=random
${random_username}= Generate Random String 8 [LETTERS]
Run IPMI Standard Command
... user set name ${random_userid} ${random_username}
# Verify new user privilege level via Redfish.
${privilege}= Redfish_Utils.Get Attribute
... /redfish/v1/AccountService/Accounts/${random_username} RoleId
Valid Value privilege ['ReadOnly']
Create Admin User Via Redfish And Verify Login Via IPMI
[Documentation] Create user via redfish and verify via IPMI.
[Tags] Create_Admin_User_Via_Redfish_And_Verify_Login_Via_IPMI
${random_username}= Generate Random String 8 [LETTERS]
Set Test Variable ${random_username}
${payload}= Create Dictionary
... UserName=${random_username} Password=${valid_password}
... RoleId=Administrator Enabled=${True}
Redfish.Post /redfish/v1/AccountService/Accounts body=&{payload}
... valid_status_codes=[${HTTP_CREATED}]
# Add delay for a new admin user password to set.
Sleep 5s
Enable IPMI Access To User Using Redfish ${random_username}
# Update user password using Redfish.
${payload}= Create Dictionary Password=${valid_password2}
Redfish.Patch /redfish/v1/AccountService/Accounts/${random_username} body=&{payload}
Verify IPMI Username And Password ${random_username} ${valid_password2}
Delete User Via Redfish And Verify Using IPMI
[Documentation] Delete user via redfish and verify using IPMI.
[Tags] Delete_User_Via_Redfish_And_Verify_Using_IPMI
# Create user using Redfish.
${random_username}= Generate Random String 8 [LETTERS]
Set Test Variable ${random_username}
${payload}= Create Dictionary
... UserName=${random_username} Password=${valid_password}
... RoleId=Administrator Enabled=${True}
Redfish.Post /redfish/v1/AccountService/Accounts body=&{payload}
... valid_status_codes=[${HTTP_CREATED}]
Enable IPMI Access To User Using Redfish ${random_username}
# Update user password using Redfish.
${payload}= Create Dictionary Password=${valid_password2}
Redfish.Patch /redfish/v1/AccountService/Accounts/${random_username} body=&{payload}
# Delete user using Redfish.
Redfish.Delete /redfish/v1/AccountService/Accounts/${random_username}
# Verify that IPMI command fails with deleted user.
Run Keyword And Expect Error *Error: Unable to establish IPMI*
... Verify IPMI Username And Password ${random_username} ${valid_password2}
*** Keywords ***
Create IPMI Random User With Password And Privilege
[Documentation] Create random IPMI user with given password and privilege
... level.
[Arguments] ${password} ${privilege}=0
# Description of argument(s):
# password Password to be assigned for the user.
# privilege Privilege level for the user (e.g. "1", "2", "3", etc.).
# Create IPMI user.
${random_username}= Generate Random String 8 [LETTERS]
Set Suite Variable ${random_username}
${random_userid}= Find And Return Free User Id
IPMI Create User ${random_userid} ${random_username}
# Set given password for newly created user.
Run IPMI Standard Command
... user set password ${random_userid} ${password}
# Enable IPMI user.
Run IPMI Standard Command user enable ${random_userid}
# Set given privilege and enable IPMI messaging for newly created user.
Run Keyword If '${privilege}' != '0'
... Set Channel Access ${random_userid} ipmi=on privilege=${privilege}
[Return] ${random_username} ${random_userid}
Delete Users Via Redfish
[Documentation] Delete all the users via redfish from given list.
[Arguments] ${user_list}
# Description of argument(s):
# user_list List of user which are to be deleted.
Redfish.Login
FOR ${user} IN @{user_list}
Redfish.Delete ${user}
END
Redfish.Logout
Enable IPMI Access To User Using Redfish
[Documentation] Add IPMI access to a user through Redfish.
[Arguments] ${user_name}
# Description of argument(s):
# user_name User name to which IPMI access is to be added.
# Adding IPMI access to user name.
Redfish.Patch /redfish/v1/AccountService/Accounts/${user_name}
... body={"AccountTypes": ["Redfish", "HostConsole", "ManagerConsole", "WebUI", "IPMI"]}
Test Setup Execution
[Documentation] Do test case setup tasks.
Redfish.Login
Test Teardown Execution
[Documentation] Do the post test teardown.
FFDC On Test Case Fail
# Delete the test user.
Run Keyword And Ignore Error
... Redfish.Delete /redfish/v1/AccountService/Accounts/${random_username}
Redfish.Logout
Find And Return Free User Id
[Documentation] Find and return userid that is not being used.
FOR ${index} IN RANGE 300
# IPMI maximum users count (i.e. 15 users).
${random_userid}= Evaluate random.randint(1, ${ipmi_max_num_users}) modules=random
${access_output}= Run IPMI Standard Command channel getaccess 1 ${random_userid}
${name_line}= Get Lines Containing String ${access_output} User Name
Log To Console For ID ${random_userid}: ${name_line}
${is_empty}= Run Keyword And Return Status
... Should Match Regexp ${name_line} ${empty_name_pattern}
Exit For Loop If ${is_empty} == ${True}
END
Run Keyword If '${index}' == '299' Fail msg=A free user ID could not be found.
[Return] ${random_userid}