Modify user roles supported by Redfish
Resolves openbmc/openbmc-test-automation#1981
Signed-off-by: Prashanth Katti <prkatti1@in.ibm.com>
Change-Id: I34157527de2541f9e55c54db17067294627ccfaf
diff --git a/redfish/account_service/test_ldap_configuration.robot b/redfish/account_service/test_ldap_configuration.robot
index 6e44d29..939e924 100644
--- a/redfish/account_service/test_ldap_configuration.robot
+++ b/redfish/account_service/test_ldap_configuration.robot
@@ -200,8 +200,7 @@
[Teardown] Run Keywords FFDC On Test Case Fail AND Restore LDAP Privilege
[Template] Set Read Privilege And Check Firmware Inventory
- User
- Callback
+ ReadOnly
Verify LDAP User With Read Privilege Should Not Do Host Poweron
@@ -211,8 +210,7 @@
[Teardown] Run Keywords FFDC On Test Case Fail AND Restore LDAP Privilege
[Template] Set Read Privilege And Check Poweron
- User
- Callback
+ ReadOnly
Update LDAP Group Name And Verify Operations
@@ -225,12 +223,12 @@
# group_name group_privilege valid_status_codes
${GROUP_NAME} Administrator [${HTTP_OK}]
${GROUP_NAME} Operator [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
- ${GROUP_NAME} User [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
- ${GROUP_NAME} Callback [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
+ ${GROUP_NAME} ReadOnly [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
+ ${GROUP_NAME} NoAccess [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
Invalid_LDAP_Group_Name Administrator [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
Invalid_LDAP_Group_Name Operator [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
- Invalid_LDAP_Group_Name User [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
- Invalid_LDAP_Group_Name Callback [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
+ Invalid_LDAP_Group_Name ReadOnly [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
+ Invalid_LDAP_Group_Name NoAccess [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}]
Verify LDAP BaseDN Update And LDAP Login