blob: 15463dbdc010910ef85bdefec0df9240ebc3d742 [file] [log] [blame]
Sivas SRR6aa101f2019-02-19 22:31:55 -06001*** Settings ***
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -05002Documentation Test suite for verifying Redfish admin, readonly operation user accounts.
Sivas SRR6aa101f2019-02-19 22:31:55 -06003
4Resource ../../lib/resource.robot
5Resource ../../lib/bmc_redfish_resource.robot
6Resource ../../lib/openbmc_ffdc.robot
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -05007Resource ../../lib/bmc_redfish_utils.robot
Sivas SRR6aa101f2019-02-19 22:31:55 -06008
manashsarma654cbc12021-09-23 02:28:12 -05009Library SSHLibrary
10
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -050011Test Setup Redfish.Login
Sivas SRR6aa101f2019-02-19 22:31:55 -060012Test Teardown Test Teardown Execution
13
Sridevi Rameshcf0c8b02025-09-17 06:22:35 -050014Test Tags User_Account
15
Sandhya Somashekar37122b62019-06-18 06:02:02 -050016*** Variables ***
17
18${account_lockout_duration} ${30}
19${account_lockout_threshold} ${3}
George Keishingf8e18192023-07-05 14:26:27 +053020${ssh_status} ${True}
21
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -050022*** Test Cases ***
Sivas SRR6aa101f2019-02-19 22:31:55 -060023
24Verify AccountService Available
Sivas SRRfa6831c2019-02-22 00:12:00 -060025 [Documentation] Verify Redfish account service is available.
Sivas SRR6aa101f2019-02-19 22:31:55 -060026 [Tags] Verify_AccountService_Available
27
George Keishing97c93942019-03-04 12:45:07 -060028 ${resp} = Redfish_utils.Get Attribute /redfish/v1/AccountService ServiceEnabled
Sivas SRR6aa101f2019-02-19 22:31:55 -060029 Should Be Equal As Strings ${resp} ${True}
30
Rahul Maheshwarid0aa72b2022-08-23 06:44:07 -050031
32Verify Redfish Admin User Persistence After Reboot
33 [Documentation] Verify Redfish admin user persistence after reboot.
34 [Tags] Verify_Redfish_Admin_User_Persistence_After_Reboot
35 [Setup] Run Keywords Redfish.Login AND
36 ... Redfish Create User admin_user TestPwd123 Administrator ${True}
37 [Teardown] Run Keywords Redfish.Delete /redfish/v1/AccountService/Accounts/admin_user
38 ... AND Test Teardown Execution
Sandhya Somashekara83fb472019-08-29 02:26:21 -050039
40 # Reboot BMC.
41 Redfish OBMC Reboot (off) stack_mode=normal
Sandhya Somashekara83fb472019-08-29 02:26:21 -050042
43 # Verify users after reboot.
44 Redfish Verify User admin_user TestPwd123 Administrator ${True}
Rahul Maheshwarid0aa72b2022-08-23 06:44:07 -050045
46
47Verify Redfish Operator User Persistence After Reboot
48 [Documentation] Verify Redfish operator user persistence after reboot.
49 [Tags] Verify_Redfish_Operator_User_Persistence_After_Reboot
50 [Setup] Run Keywords Redfish.Login AND
51 ... Redfish Create User operator_user TestPwd123 Operator ${True}
52 [Teardown] Run Keywords Redfish.Delete /redfish/v1/AccountService/Accounts/operator_user
53 ... AND Test Teardown Execution
54
55 # Reboot BMC.
56 Redfish OBMC Reboot (off) stack_mode=normal
57
58 # Verify users after reboot.
Sandhya Somashekara83fb472019-08-29 02:26:21 -050059 Redfish Verify User operator_user TestPwd123 Operator ${True}
Rahul Maheshwarid0aa72b2022-08-23 06:44:07 -050060
61
62Verify Redfish Readonly User Persistence After Reboot
63 [Documentation] Verify Redfish readonly user persistence after reboot.
64 [Tags] Verify_Redfish_Readonly_User_Persistence_After_Reboot
65 [Setup] Run Keywords Redfish.Login AND
66 ... Redfish Create User readonly_user TestPwd123 ReadOnly ${True}
67 [Teardown] Run Keywords Redfish.Delete /redfish/v1/AccountService/Accounts/readonly_user
68 ... AND Test Teardown Execution
69
70 # Reboot BMC.
71 Redfish OBMC Reboot (off) stack_mode=normal
72
73 # Verify users after reboot.
Anusha Dathatri4062b442020-02-03 04:39:15 -060074 Redfish Verify User readonly_user TestPwd123 ReadOnly ${True}
Sandhya Somashekara83fb472019-08-29 02:26:21 -050075
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -050076Redfish Create and Verify Admin User
77 [Documentation] Create a Redfish user with administrator role and verify.
George Keishingf5176902022-05-12 04:23:59 -050078 [Tags] Redfish_Create_and_Verify_Admin_User
Sandhya Somashekar00f59cc2019-03-05 03:39:47 -060079 [Template] Redfish Create And Verify User
80
Sandhya Somashekare92b1e62019-04-25 05:27:45 -050081 #username password role_id enabled
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -050082 admin_user TestPwd123 Administrator ${True}
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -050083
84
85Redfish Create and Verify Operator User
86 [Documentation] Create a Redfish user with operator role and verify.
87 [Tags] Redfish_Create_and_Verify_Operator_User
88 [Template] Redfish Create And Verify User
89
90 #username password role_id enabled
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -050091 operator_user TestPwd123 Operator ${True}
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -050092
93
94Redfish Create and Verify Readonly User
95 [Documentation] Create a Redfish user with readonly role and verify.
96 [Tags] Redfish_Create_and_Verify_Readonly_User
97 [Template] Redfish Create And Verify User
98
99 #username password role_id enabled
Anusha Dathatri4062b442020-02-03 04:39:15 -0600100 readonly_user TestPwd123 ReadOnly ${True}
Sivas SRR6aa101f2019-02-19 22:31:55 -0600101
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500102
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500103Verify Redfish Admin User Login With Wrong Password
104 [Documentation] Verify Redfish create admin user with valid password and make sure
105 ... admin user failed to login with wrong password.
106 [Tags] Verify_Redfish_Admin_User_Login_With_Wrong_Password
107 [Template] Verify Redfish User Login With Wrong Password
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500108
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500109 #username password role_id enabled wrong_password
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500110 admin_user TestPwd123 Administrator ${True} alskjhfwurh
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500111
112
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500113Verify Redfish Operator User Login With Wrong Password
114 [Documentation] Verify Redfish create operator user with valid password and make sure
115 ... operator user failed to login with wrong password.
116 [Tags] Verify_Redfish_Operator_User_Login_With_Wrong_Password
117 [Template] Verify Redfish User Login With Wrong Password
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500118
119 #username password role_id enabled wrong_password
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500120 operator_user TestPwd123 Operator ${True} 12j8a8uakjhdaosiruf024
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500121
122
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500123Verify Redfish Readonly User Login With Wrong Password
124 [Documentation] Verify Redfish create readonly user with valid password and make sure
125 ... readonly user failed to login with wrong password.
126 [Tags] Verify_Redfish_Readonly_User_Login_With_Wrong_Password
127 [Template] Verify Redfish User Login With Wrong Password
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500128
129 #username password role_id enabled wrong_password
Anusha Dathatri4062b442020-02-03 04:39:15 -0600130 readonly_user TestPwd123 ReadOnly ${True} 12
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500131
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500132
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500133Verify Login with Deleted Redfish Admin User
134 [Documentation] Verify login with deleted Redfish admin user.
135 [Tags] Verify_Login_with_Deleted_Redfish_Admin_User
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500136 [Template] Verify Login with Deleted Redfish User
137
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500138 #username password role_id enabled
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500139 admin_user TestPwd123 Administrator ${True}
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500140
141
142Verify Login with Deleted Redfish Operator User
143 [Documentation] Verify login with deleted Redfish operator user.
144 [Tags] Verify_Login_with_Deleted_Redfish_Operator_User
145 [Template] Verify Login with Deleted Redfish User
146
147 #username password role_id enabled
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500148 operator_user TestPwd123 Operator ${True}
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500149
150
151Verify Login with Deleted Redfish Readonly User
152 [Documentation] Verify login with deleted Redfish readonly user.
153 [Tags] Verify_Login_with_Deleted_Redfish_Readonly_User
154 [Template] Verify Login with Deleted Redfish User
155
156 #username password role_id enabled
Anusha Dathatri4062b442020-02-03 04:39:15 -0600157 readonly_user TestPwd123 ReadOnly ${True}
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500158
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500159
160Verify Admin User Creation Without Enabling It
161 [Documentation] Verify admin user creation without enabling it.
162 [Tags] Verify_Admin_User_Creation_Without_Enabling_It
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500163 [Template] Verify Create User Without Enabling
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500164
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500165 #username password role_id enabled
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500166 admin_user TestPwd123 Administrator ${False}
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500167
168
169Verify Operator User Creation Without Enabling It
170 [Documentation] Verify operator user creation without enabling it.
171 [Tags] Verify_Operator_User_Creation_Without_Enabling_It
172 [Template] Verify Create User Without Enabling
173
174 #username password role_id enabled
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500175 operator_user TestPwd123 Operator ${False}
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500176
177
178Verify Readonly User Creation Without Enabling It
179 [Documentation] Verify readonly user creation without enabling it.
180 [Tags] Verify_Readonly_User_Creation_Without_Enabling_It
181 [Template] Verify Create User Without Enabling
182
183 #username password role_id enabled
Anusha Dathatri4062b442020-02-03 04:39:15 -0600184 readonly_user TestPwd123 ReadOnly ${False}
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500185
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500186
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500187Verify User Creation With Invalid Role Id
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500188 [Documentation] Verify user creation with invalid role ID.
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500189 [Tags] Verify_User_Creation_With_Invalid_Role_Id
190
191 # Make sure the user account in question does not already exist.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600192 Redfish.Delete /redfish/v1/AccountService/Accounts/test_user
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500193 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NOT_FOUND}]
194
195 # Create specified user.
196 ${payload}= Create Dictionary
197 ... UserName=test_user Password=TestPwd123 RoleId=wrongroleid Enabled=${True}
Anusha Dathatri466816f2020-01-30 05:12:36 -0600198 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{payload}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500199 ... valid_status_codes=[${HTTP_BAD_REQUEST}]
200
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500201Verify Error Upon Creating Same Users With Different Privileges
202 [Documentation] Verify error upon creating same users with different privileges.
203 [Tags] Verify_Error_Upon_Creating_Same_Users_With_Different_Privileges
204
205 Redfish Create User test_user TestPwd123 Administrator ${True}
206
207 # Create specified user.
208 ${payload}= Create Dictionary
Nandish-Matti232a6f02023-04-07 05:54:32 -0500209 ... UserName=test_user Password=TestPwd123 RoleId=ReadOnly Enabled=${True}
Anusha Dathatri466816f2020-01-30 05:12:36 -0600210 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{payload}
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500211 ... valid_status_codes=[${HTTP_BAD_REQUEST}]
212
Anusha Dathatri466816f2020-01-30 05:12:36 -0600213 Redfish.Delete /redfish/v1/AccountService/Accounts/test_user
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500214
Rahul Maheshwari124ebef2022-08-23 12:06:59 -0500215
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500216Verify Modifying User Attributes
217 [Documentation] Verify modifying user attributes.
218 [Tags] Verify_Modifying_User_Attributes
Rahul Maheshwari124ebef2022-08-23 12:06:59 -0500219
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500220 # Create Redfish users.
221 Redfish Create User admin_user TestPwd123 Administrator ${True}
Anusha Dathatri4062b442020-02-03 04:39:15 -0600222 Redfish Create User readonly_user TestPwd123 ReadOnly ${True}
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500223
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500224 # Make sure the new user account does not already exist.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600225 Redfish.Delete /redfish/v1/AccountService/Accounts/newadmin_user
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500226 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NOT_FOUND}]
227
228 # Update admin_user username using Redfish.
229 ${payload}= Create Dictionary UserName=newadmin_user
Anusha Dathatri466816f2020-01-30 05:12:36 -0600230 Redfish.Patch /redfish/v1/AccountService/Accounts/admin_user body=&{payload}
George Keishing3f2902e2025-03-14 08:19:02 +0530231 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}]
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500232
Anusha Dathatri4062b442020-02-03 04:39:15 -0600233 # Update readonly_user role using Redfish.
Rahul Maheshwari124ebef2022-08-23 12:06:59 -0500234 ${payload}= Create Dictionary RoleId=Administrator
Anusha Dathatri466816f2020-01-30 05:12:36 -0600235 Redfish.Patch /redfish/v1/AccountService/Accounts/readonly_user body=&{payload}
George Keishing3f2902e2025-03-14 08:19:02 +0530236 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}]
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500237
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500238 # Verify users after updating
239 Redfish Verify User newadmin_user TestPwd123 Administrator ${True}
Rahul Maheshwari124ebef2022-08-23 12:06:59 -0500240 Redfish Verify User readonly_user TestPwd123 Administrator ${True}
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500241
242 # Delete created users.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600243 Redfish.Delete /redfish/v1/AccountService/Accounts/newadmin_user
Anusha Dathatri466816f2020-01-30 05:12:36 -0600244 Redfish.Delete /redfish/v1/AccountService/Accounts/readonly_user
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500245
Rahul Maheshwari124ebef2022-08-23 12:06:59 -0500246
247Verify Modifying Operator User Attributes
248 [Documentation] Verify modifying operator user attributes.
249 [Tags] Verify_Modifying_Operator_User_Attributes
250 [Setup] Run Keywords Redfish.Login AND
251 ... Redfish Create User operator_user TestPwd123 Operator ${True}
252 [Teardown] Run Keywords Redfish.Delete /redfish/v1/AccountService/Accounts/operator_user
253 ... AND Test Teardown Execution
254
255 # Update operator_user password using Redfish.
256 ${payload}= Create Dictionary Password=NewTestPwd123
257 Redfish.Patch /redfish/v1/AccountService/Accounts/operator_user body=&{payload}
258
259 # Verify users after updating
260 Redfish Verify User operator_user NewTestPwd123 Operator ${True}
261
262
Sandhya Somashekar37122b62019-06-18 06:02:02 -0500263Verify User Account Locked
264 [Documentation] Verify user account locked upon trying with invalid password.
265 [Tags] Verify_User_Account_Locked
266
267 Redfish Create User admin_user TestPwd123 Administrator ${True}
268
Joy Onyerikwu1483ce02019-06-26 14:56:36 -0500269 ${payload}= Create Dictionary AccountLockoutThreshold=${account_lockout_threshold}
270 ... AccountLockoutDuration=${account_lockout_duration}
271 Redfish.Patch ${REDFISH_ACCOUNTS_SERVICE_URI} body=${payload}
George Keishing1f8db9c2025-04-01 21:37:44 +0530272 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}]
Sandhya Somashekar37122b62019-06-18 06:02:02 -0500273
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500274 Redfish.Logout
275
Sandhya Somashekar37122b62019-06-18 06:02:02 -0500276 # Make ${account_lockout_threshold} failed login attempts.
277 Repeat Keyword ${account_lockout_threshold} times
Vidya-Kalasappanavar4831f592025-04-21 04:17:21 -0500278 ... Run Keyword And Expect Error *InvalidCredentialsError* Redfish.Login admin_user abcd1234
Sandhya Somashekar37122b62019-06-18 06:02:02 -0500279
280 # Verify that legitimate login fails due to lockout.
Vidya-Kalasappanavar4831f592025-04-21 04:17:21 -0500281 Run Keyword And Expect Error *InvalidCredentialsError*
Sandhya Somashekar37122b62019-06-18 06:02:02 -0500282 ... Redfish.Login admin_user TestPwd123
283
Vidya-Kalasappanavar344c21d2025-07-01 12:21:05 -0500284 # Wait for lockout duration to expire and adding 5 sec delay to the account lock timeout
285 # ... then verify that login works.
286 ${total_wait_duartion}= Evaluate ${account_lockout_duration} + 5
287 Sleep ${total_wait_duartion}s
288
Sandhya Somashekar37122b62019-06-18 06:02:02 -0500289 Redfish.Login admin_user TestPwd123
290
291 Redfish.Logout
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500292
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500293 Redfish.Login
294
Anusha Dathatri466816f2020-01-30 05:12:36 -0600295 Redfish.Delete /redfish/v1/AccountService/Accounts/admin_user
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500296
aravinth0510746884b2022-09-29 16:04:07 +0000297
298Verify User Account Unlock
299 [Documentation] Verify manually unlocking the account before lockout time
300 [Tags] Verify_User_Account_Unlock
George Keishinga36926b2023-05-17 21:54:34 +0530301 [Teardown] Run Keywords Redfish.Logout
302 ... AND Redfish.Login
aravinth0510746884b2022-09-29 16:04:07 +0000303 ... AND Redfish.Delete /redfish/v1/AccountService/Accounts/test_user
304 ... AND SSHLibrary.Close All Connections
305
306 Redfish Create User test_user TestPwd123 Administrator ${True}
307
308 ${payload}= Create Dictionary
309 ... AccountLockoutThreshold=${account_lockout_threshold}
310 ... AccountLockoutDuration=${account_lockout_duration}
311 Redfish.Patch ${REDFISH_ACCOUNTS_SERVICE_URI} body=${payload}
312
313 Redfish.Logout
314
315 # Make ${account_lockout_threshold} failed login attempts.
316 Repeat Keyword ${account_lockout_threshold} times
317 ... Run Keyword And Expect Error InvalidCredentialsError*
318 ... Redfish.Login test_user abc123
319
320 # Ensure SSH Login with locked account gets failed
321 SSHLibrary.Open Connection ${OPENBMC_HOST}
322 Run Keyword And Expect Error Authentication failed*
323 ... SSHLibrary.Login test_user TestPwd123
324
325 # Verify that legitimate login fails due to lockout.
326 Run Keyword And Expect Error InvalidCredentialsError*
327 ... Redfish.Login test_user TestPwd123
328
329 ${payload}= Create Dictionary Locked=${FALSE}
330
331 # Manually unlock the account before lockout threshold expires
332 Redfish.Login
333 Redfish.Patch ${REDFISH_ACCOUNTS_URI}test_user body=${payload}
334 Redfish.Logout
335
336 # Try redfish login with the recently unlocked account
337 Redfish.Login test_user TestPwd123
338
339 # Try SSH login with the unlocked account
340 SSHLibrary.Open Connection ${OPENBMC_HOST}
341 SSHLibrary.Login test_user TestPwd123
342
343
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500344Verify Admin User Privilege
345 [Documentation] Verify admin user privilege.
346 [Tags] Verify_Admin_User_Privilege
347
348 Redfish Create User admin_user TestPwd123 Administrator ${True}
Anusha Dathatri4062b442020-02-03 04:39:15 -0600349 Redfish Create User readonly_user TestPwd123 ReadOnly ${True}
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500350
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500351 Redfish.Logout
352
Rahul Maheshwari3bc08642022-08-23 12:49:48 -0500353 Redfish.Login admin_user TestPwd123
354
355 # Change password of 'readonly' user with admin user.
356 Redfish.Patch /redfish/v1/AccountService/Accounts/readonly_user body={'Password': 'NewTestPwd123'}
357
358 # Verify modified user.
359 Redfish Verify User readonly_user NewTestPwd123 ReadOnly ${True}
360
361 # Note: Delete user would work here because a root login is
362 # performed as part of "Redfish Verify User" keyword's teardown.
363 Redfish.Delete /redfish/v1/AccountService/Accounts/admin_user
364 Redfish.Delete /redfish/v1/AccountService/Accounts/readonly_user
365
366
367Verify Operator User Role Change Using Admin Privilege User
368 [Documentation] Verify operator user role change using admin privilege user
369 [Tags] Verify_Operator_User_Role_Change_Using_Admin_Privilege_User
370
371 Redfish Create User admin_user TestPwd123 Administrator ${True}
372 Redfish Create User operator_user TestPwd123 Operator ${True}
373
374 Redfish.Logout
375
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500376 # Change role ID of operator user with admin user.
377 # Login with admin user.
378 Redfish.Login admin_user TestPwd123
379
380 # Modify Role ID of Operator user.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600381 Redfish.Patch /redfish/v1/AccountService/Accounts/operator_user body={'RoleId': 'Administrator'}
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500382
383 # Verify modified user.
384 Redfish Verify User operator_user TestPwd123 Administrator ${True}
385
Anusha Dathatri466816f2020-01-30 05:12:36 -0600386 Redfish.Delete /redfish/v1/AccountService/Accounts/admin_user
387 Redfish.Delete /redfish/v1/AccountService/Accounts/operator_user
Rahul Maheshwari3bc08642022-08-23 12:49:48 -0500388
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500389
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500390Verify Operator User Privilege
391 [Documentation] Verify operator user privilege.
George Keishing5236ec52022-01-31 12:07:58 -0600392 [Tags] Verify_Operator_User_Privilege
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500393
394 Redfish Create User admin_user TestPwd123 Administrator ${True}
395 Redfish Create User operator_user TestPwd123 Operator ${True}
396
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500397 Redfish.Logout
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500398 # Login with operator user.
399 Redfish.Login operator_user TestPwd123
400
George Keishing093c1bd2020-02-10 09:47:34 -0600401 # Verify BMC reset.
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500402 Run Keyword And Expect Error ValueError* Redfish BMC Reset Operation
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500403
404 # Attempt to change password of admin user with operator user.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600405 Redfish.Patch /redfish/v1/AccountService/Accounts/admin_user body={'Password': 'NewTestPwd123'}
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500406 ... valid_status_codes=[${HTTP_FORBIDDEN}]
407
408 Redfish.Logout
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500409
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500410 Redfish.Login
411
Anusha Dathatri466816f2020-01-30 05:12:36 -0600412 Redfish.Delete /redfish/v1/AccountService/Accounts/admin_user
413 Redfish.Delete /redfish/v1/AccountService/Accounts/operator_user
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500414
415
Anusha Dathatri4062b442020-02-03 04:39:15 -0600416Verify ReadOnly User Privilege
417 [Documentation] Verify ReadOnly user privilege.
418 [Tags] Verify_ReadOnly_User_Privilege
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500419
Anusha Dathatri4062b442020-02-03 04:39:15 -0600420 Redfish Create User readonly_user TestPwd123 ReadOnly ${True}
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500421 Redfish.Logout
422
423 # Login with read_only user.
424 Redfish.Login readonly_user TestPwd123
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500425
426 # Read system level data.
427 ${system_model}= Redfish_Utils.Get Attribute
428 ... ${SYSTEM_BASE_URI} Model
429
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500430 Redfish.Logout
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500431 Redfish.Login
Anusha Dathatri4062b442020-02-03 04:39:15 -0600432 Redfish.Delete ${REDFISH_ACCOUNTS_URI}readonly_user
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500433
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500434
Sridevi Ramesh34acff52025-08-07 03:34:22 -0500435Verify Minimum Password Length For Redfish Admin And Readonly User
436 [Documentation] Verify minimum password length for new and existing admin or
437 ... readonly user.
438 [Template] Verify Minimum Password Length For Redfish User
Anusha Dathatri466816f2020-01-30 05:12:36 -0600439
Sridevi Ramesh34acff52025-08-07 03:34:22 -0500440 #username role_id
441 admin_user Administrator
442 readonly_user ReadOnly
Anusha Dathatri466816f2020-01-30 05:12:36 -0600443
444
Tony Lee94335f42021-02-04 15:16:39 +0800445Verify Standard User Roles Defined By Redfish
446 [Documentation] Verify standard user roles defined by Redfish.
447 [Tags] Verify_Standard_User_Roles_Defined_By_Redfish
448
449 ${member_list}= Redfish_Utils.Get Member List
450 ... /redfish/v1/AccountService/Roles
451
452 @{roles}= Create List
453 ... /redfish/v1/AccountService/Roles/Administrator
454 ... /redfish/v1/AccountService/Roles/Operator
455 ... /redfish/v1/AccountService/Roles/ReadOnly
456
457 List Should Contain Sub List ${member_list} ${roles}
458
459 # The standard roles are:
460
461 # | Role name | Assigned privileges |
462 # | Administrator | Login, ConfigureManager, ConfigureUsers, ConfigureComponents, ConfigureSelf |
463 # | Operator | Login, ConfigureComponents, ConfigureSelf |
464 # | ReadOnly | Login, ConfigureSelf |
465
466 @{admin}= Create List Login ConfigureManager ConfigureUsers ConfigureComponents ConfigureSelf
467 @{operator}= Create List Login ConfigureComponents ConfigureSelf
468 @{readOnly}= Create List Login ConfigureSelf
469
470 ${roles_dict}= create dictionary admin_privileges=${admin} operator_privileges=${operator}
471 ... readOnly_privileges=${readOnly}
472
473 ${resp}= redfish.Get /redfish/v1/AccountService/Roles/Administrator
474 List Should Contain Sub List ${resp.dict['AssignedPrivileges']} ${roles_dict['admin_privileges']}
475
476 ${resp}= redfish.Get /redfish/v1/AccountService/Roles/Operator
477 List Should Contain Sub List ${resp.dict['AssignedPrivileges']} ${roles_dict['operator_privileges']}
478
479 ${resp}= redfish.Get /redfish/v1/AccountService/Roles/ReadOnly
480 List Should Contain Sub List ${resp.dict['AssignedPrivileges']} ${roles_dict['readOnly_privileges']}
481
482
manashsarma4910aa22021-07-26 09:12:36 -0500483Verify Error While Deleting Root User
484 [Documentation] Verify error while deleting root user.
485 [Tags] Verify_Error_While_Deleting_Root_User
486
487 Redfish.Delete /redfish/v1/AccountService/Accounts/root valid_status_codes=[${HTTP_FORBIDDEN}]
488
489
manashsarma654cbc12021-09-23 02:28:12 -0500490Verify SSH Login Access With Admin User
George Keishingf8e18192023-07-05 14:26:27 +0530491 [Documentation] Verify that admin user have SSH login access.
492 ... By default, admin should have access but there could be
493 ... case where admin user shell access is restricted by design
494 ... in the community sphere..
manashsarma654cbc12021-09-23 02:28:12 -0500495 [Tags] Verify_SSH_Login_Access_With_Admin_User
496
497 # Create an admin User.
498 Redfish Create User new_admin TestPwd1 Administrator ${True}
499
500 # Attempt SSH login with admin user.
501 SSHLibrary.Open Connection ${OPENBMC_HOST}
502 ${status}= Run Keyword And Return Status SSHLibrary.Login new_admin TestPwd1
George Keishingf8e18192023-07-05 14:26:27 +0530503
504 # By default ssh_status is True, user can change the status via CLI
505 # -v ssh_status:False
506 Should Be Equal As Strings "${status}" "${ssh_status}"
manashsarma654cbc12021-09-23 02:28:12 -0500507
George Keishinge8015b32022-09-19 09:38:47 -0500508 Redfish.Login
509 Redfish.Delete /redfish/v1/AccountService/Accounts/new_admin
510
manashsarma654cbc12021-09-23 02:28:12 -0500511
aravinth0510746884b2022-09-29 16:04:07 +0000512Verify Configure BasicAuth Enable And Disable
513 [Documentation] Verify configure basicauth enable and disable
514 [Tags] Verify_Configure_BasicAuth_Enable_And_Disable
515 [Template] Template For Configure Auth Methods
516
517 # auth_method
518 BasicAuth
519 XToken
520
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500521
522Redfish Create and Verify Admin User With Invalid Password Format
523 [Documentation] Create a admin user with invalid password format and verify.
524 [Template] Create User With Unsupported Password Format And Verify
525 [Tags] Redfish_Create_and_Verify_Admin_User_With_Invalid_Password_Format
526
527 #username role_id password
528 admin_user Administrator snellens
529 admin_user Administrator 10000001
530 admin_user Administrator 12345678
531 admin_user Administrator abcdefgh
532 admin_user Administrator abf12345
533 admin_user Administrator helloworld
534 admin_user Administrator HELLOWORLD
535 admin_user Administrator &$%**!*@
536 admin_user Administrator Dictation
537
538
539Redfish Create and Verify Readonly User With Invalid Password Format
540 [Documentation] Create a readonly user with invalid password format and verify.
541 [Template] Create User With Unsupported Password Format And Verify
542 [Tags] Redfish_Create_and_Verify_Readonly_User_With_Invalid_Password_Format
543
544 #username role_id password
545 readonly_user ReadOnly snellens
546 readonly_user ReadOnly 10000001
547 readonly_user ReadOnly 12345678
548 readonly_user ReadOnly abcdefgh
549 readonly_user ReadOnly abf12345
550 readonly_user ReadOnly helloworld
551 readonly_user ReadOnly HELLOWORLD
552 readonly_user ReadOnly &$%**!*@
553 readonly_user ReadOnly Dictation
554
555
Sridevi Ramesh1a2d0452025-08-05 12:16:51 -0500556Verify Admin And Readonly User Password Is Not Same As Username
557 [Documentation] Verify that admin and readonly user creation is failed if
558 ... password is same as username.
559 [Template] Create User With Unsupported Password Format And Verify
560 [Tags] Verify_Admin_And_Readonly_User_Password_Is_Not_Same_As_Username
561
562 #username role_id password
563 AdminUser1 Administrator AdminUser1
564 ReadOnlyUser1 ReadOnly ReadOnlyUser1
565
566
Sivas SRR6aa101f2019-02-19 22:31:55 -0600567*** Keywords ***
568
Sivas SRR6aa101f2019-02-19 22:31:55 -0600569Test Teardown Execution
570 [Documentation] Do the post test teardown.
571
Anusha Dathatridb769702020-02-12 01:02:30 -0600572 Run Keyword And Ignore Error Redfish.Logout
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500573 FFDC On Test Case Fail
574
Sandhya Somashekar00f59cc2019-03-05 03:39:47 -0600575
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500576Redfish Create User
577 [Documentation] Redfish create user.
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500578 [Arguments] ${username} ${password} ${role_id} ${enabled} ${login_check}=${True}
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500579
580 # Description of argument(s):
581 # username The username to be created.
582 # password The password to be assigned.
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500583 # role_id The role ID of the user to be created
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500584 # (e.g. "Administrator", "Operator", etc.).
585 # enabled Indicates whether the username being created
586 # should be enabled (${True}, ${False}).
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500587 # login_check Checks user login for created user.
588 # (e.g. ${True}, ${False}).
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500589
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500590 # Make sure the user account in question does not already exist.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600591 Redfish.Delete /redfish/v1/AccountService/Accounts/${userName}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500592 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NOT_FOUND}]
593
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500594 # Create specified user.
595 ${payload}= Create Dictionary
596 ... UserName=${username} Password=${password} RoleId=${role_id} Enabled=${enabled}
Anusha Dathatri466816f2020-01-30 05:12:36 -0600597 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{payload}
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500598 ... valid_status_codes=[${HTTP_CREATED}]
599
Rahul Maheshwari9928b1d2021-07-19 04:59:55 -0500600 # Resetting faillock count as a workaround for issue
Anusha Dathatrif7268b52020-02-19 01:03:49 -0600601 # openbmc/phosphor-user-manager#4
Rahul Maheshwari638a5982024-04-19 07:35:15 -0500602 ${cmd}= Catenate /usr/sbin/faillock --user ${username} --reset
Alagiridhilipankb9c93772024-04-02 10:04:27 +0000603
Anusha Dathatrif7268b52020-02-19 01:03:49 -0600604 Bmc Execute Command ${cmd}
605
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500606 # Verify login with created user.
George Keishing79fc7f02025-05-02 00:37:49 +0530607 IF '${login_check}' == '${True}'
608 ${status}= Run Keyword And Return Status
609 ... Verify Redfish User Login ${username} ${password}
610 ELSE
611 ${status}= Set Variable ${False}
612 END
613
614 IF '${login_check}' == '${True}' Should Be Equal ${status} ${enabled}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500615
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500616 # Validate Role ID of created user.
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500617 ${role_config}= Redfish_Utils.Get Attribute
Anusha Dathatri466816f2020-01-30 05:12:36 -0600618 ... /redfish/v1/AccountService/Accounts/${username} RoleId
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500619 Should Be Equal ${role_id} ${role_config}
620
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500621
622Redfish Verify User
623 [Documentation] Redfish user verification.
624 [Arguments] ${username} ${password} ${role_id} ${enabled}
625
626 # Description of argument(s):
627 # username The username to be created.
628 # password The password to be assigned.
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500629 # role_id The role ID of the user to be created
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500630 # (e.g. "Administrator", "Operator", etc.).
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500631 # enabled Indicates whether the username being created
632 # should be enabled (${True}, ${False}).
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500633
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500634 ${status}= Verify Redfish User Login ${username} ${password}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500635 # Doing a check of the returned status.
636 Should Be Equal ${status} ${enabled}
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500637
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500638 # Validate Role Id of user.
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500639 ${role_config}= Redfish_Utils.Get Attribute
Anusha Dathatri466816f2020-01-30 05:12:36 -0600640 ... /redfish/v1/AccountService/Accounts/${username} RoleId
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500641 Should Be Equal ${role_id} ${role_config}
642
643
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500644Verify Redfish User Login
645 [Documentation] Verify Redfish login with given user id.
646 [Teardown] Run Keywords Run Keyword And Ignore Error Redfish.Logout AND Redfish.Login
647 [Arguments] ${username} ${password}
648
649 # Description of argument(s):
650 # username Login username.
651 # password Login password.
652
653 # Logout from current Redfish session.
George Keishing1cf2a422021-02-02 22:59:29 -0600654 # We don't really care if the current session is flushed out since we are going to login
655 # with new credential in next.
656 Run Keyword And Ignore Error Redfish.Logout
657
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500658 ${status}= Run Keyword And Return Status Redfish.Login ${username} ${password}
George Keishing409df052024-01-17 22:36:14 +0530659 RETURN ${status}
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500660
661
Sandhya Somashekar00f59cc2019-03-05 03:39:47 -0600662Redfish Create And Verify User
663 [Documentation] Redfish create and verify user.
664 [Arguments] ${username} ${password} ${role_id} ${enabled}
665
666 # Description of argument(s):
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500667 # username The username to be created.
668 # password The password to be assigned.
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500669 # role_id The role ID of the user to be created
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500670 # (e.g. "Administrator", "Operator", etc.).
671 # enabled Indicates whether the username being created
672 # should be enabled (${True}, ${False}).
Sandhya Somashekar00f59cc2019-03-05 03:39:47 -0600673
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500674 # Example:
675 #{
676 #"@odata.context": "/redfish/v1/$metadata#ManagerAccount.ManagerAccount",
677 #"@odata.id": "/redfish/v1/AccountService/Accounts/test1",
678 #"@odata.type": "#ManagerAccount.v1_0_3.ManagerAccount",
679 #"Description": "User Account",
680 #"Enabled": true,
681 #"Id": "test1",
682 #"Links": {
683 # "Role": {
684 # "@odata.id": "/redfish/v1/AccountService/Roles/Administrator"
685 # }
686 #},
687
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500688 Redfish Create User ${username} ${password} ${role_id} ${enabled}
Sandhya Somashekar00f59cc2019-03-05 03:39:47 -0600689
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500690 Redfish Verify User ${username} ${password} ${role_id} ${enabled}
Sandhya Somashekar00f59cc2019-03-05 03:39:47 -0600691
692 # Delete Specified User
Anusha Dathatri466816f2020-01-30 05:12:36 -0600693 Redfish.Delete /redfish/v1/AccountService/Accounts/${username}
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500694
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500695Verify Redfish User Login With Wrong Password
696 [Documentation] Verify Redfish User failed to login with wrong password.
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500697 [Arguments] ${username} ${password} ${role_id} ${enabled} ${wrong_password}
698
699 # Description of argument(s):
700 # username The username to be created.
701 # password The password to be assigned.
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500702 # role_id The role ID of the user to be created
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500703 # (e.g. "Administrator", "Operator", etc.).
704 # enabled Indicates whether the username being created
705 # should be enabled (${True}, ${False}).
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500706 # wrong_password Any invalid password.
707
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500708 Redfish Create User ${username} ${password} ${role_id} ${enabled}
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500709
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500710 Redfish.Logout
711
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500712 # Attempt to login with created user with invalid password.
713 Run Keyword And Expect Error InvalidCredentialsError*
714 ... Redfish.Login ${username} ${wrong_password}
715
716 Redfish.Login
717
718 # Delete newly created user.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600719 Redfish.Delete /redfish/v1/AccountService/Accounts/${username}
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500720
721
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500722Verify Login with Deleted Redfish User
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500723 [Documentation] Verify Login with Deleted Redfish User.
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500724 [Arguments] ${username} ${password} ${role_id} ${enabled}
725
726 # Description of argument(s):
727 # username The username to be created.
728 # password The password to be assigned.
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500729 # role_id The role ID of the user to be created
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500730 # (e.g. "Administrator", "Operator", etc.).
731 # enabled Indicates whether the username being created
732 # should be enabled (${True}, ${False}).
733
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500734 Redfish Create User ${username} ${password} ${role_id} ${enabled}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500735
736 # Delete newly created user.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600737 Redfish.Delete /redfish/v1/AccountService/Accounts/${userName}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500738
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500739 Redfish.Logout
740
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500741 # Attempt to login with deleted user account.
742 Run Keyword And Expect Error InvalidCredentialsError*
743 ... Redfish.Login ${username} ${password}
744
745 Redfish.Login
746
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500747
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500748Verify Create User Without Enabling
749 [Documentation] Verify Create User Without Enabling.
750 [Arguments] ${username} ${password} ${role_id} ${enabled}
751
752 # Description of argument(s):
753 # username The username to be created.
754 # password The password to be assigned.
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500755 # role_id The role ID of the user to be created
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500756 # (e.g. "Administrator", "Operator", etc.).
757 # enabled Indicates whether the username being created
758 # should be enabled (${True}, ${False}).
759
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500760 Redfish Create User ${username} ${password} ${role_id} ${enabled} ${False}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500761
762 Redfish.Logout
763
764 # Login with created user.
765 Run Keyword And Expect Error InvalidCredentialsError*
766 ... Redfish.Login ${username} ${password}
767
768 Redfish.Login
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500769
770 # Delete newly created user.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600771 Redfish.Delete /redfish/v1/AccountService/Accounts/${username}
George Keishing07fb41f2020-06-16 08:09:19 -0500772
aravinth0510746884b2022-09-29 16:04:07 +0000773Template For Configure Auth Methods
774 [Documentation] Template to configure auth methods.
775 [Arguments] ${auth_method}
776 [Teardown] Configure AuthMethods ${auth_method}=${initial_value}
777
778 # Description of Argument(s):
779 # authmethods The authmethod setting which needs to be
780 # set in account service URI.
781 # valid values BasicAuth, XToken.
782
783 Get AuthMethods Default Values ${auth_method}
784
785 # Patch basicauth to TRUE
786 Configure AuthMethods ${auth_method}=${TRUE}
787
George Keishing79fc7f02025-05-02 00:37:49 +0530788 IF "${auth_method}" == "XToken"
789 Check XToken Works Fine ${HTTP_OK}
790 ELSE
791 Check BasicAuth Works Fine ${HTTP_OK}
792 END
aravinth0510746884b2022-09-29 16:04:07 +0000793
794 # Patch basicauth to FALSE
795 Configure AuthMethods ${auth_method}=${FALSE}
796
George Keishing79fc7f02025-05-02 00:37:49 +0530797 IF "${auth_method}" == "BasicAuth"
798 Check BasicAuth Works Fine ${HTTP_UNAUTHORIZED}
799 ELSE
800 Check XToken Works Fine ${HTTP_UNAUTHORIZED}
801 END
aravinth0510746884b2022-09-29 16:04:07 +0000802
803Configure AuthMethods
804 [Documentation] Enable/disable authmethod types.
805 [Arguments] &{authmethods}
806
807 # Description of argument(s):
808 # authmethods The authmethod setting which needs to be
809 # set in account service URI.
810 # Usage Example Configure AuthMethods XToken=${TRUE} BasicAuth=${TRUE}
811 # This will set the value of "XToken" and "BasicAuth"
812 # property in accountservice uri to TRUE.
813
814 ${openbmc}= Create Dictionary AuthMethods=${authmethods}
815 ${oem}= Create Dictionary OpenBMC=${openbmc}
816 ${payload}= Create Dictionary Oem=${oem}
817
818 # Setting authmethod properties using Redfish session based auth
819 ${status}= Run Keyword And Return Status
820 ... Redfish.Patch ${REDFISH_BASE_URI}AccountService
821 ... body=${payload} valid_status_codes=[${HTTP_OK},${HTTP_NO_CONTENT}]
822
George Keishingc63bfe62023-11-15 19:09:59 +0530823 # Setting authmethod properties using basic auth in case the former fails
aravinth0510746884b2022-09-29 16:04:07 +0000824 IF ${status}==${FALSE}
825 # Payload dictionary pre-process to match json formatting
826 ${payload}= Convert To String ${payload}
827 ${payload}= Replace String ${payload} ' "
828 ${payload}= Replace String ${payload} False false
829 ${payload}= Replace String ${payload} True true
830
831 # Curl Command Framing for PATCH authmethod
832 ${cmd}= Catenate curl -k -i -u ${OPENBMC_USERNAME}:${OPENBMC_PASSWORD}
833 ... -X PATCH '${AUTH_URI}${REDFISH_ACCOUNTS_SERVICE_URI}'
834 ... -H 'content-type:application/json' -H 'If-Match:*'
835 ... -d '${payload}'
836 ${rc} ${out}= Run And Return Rc And Output ${cmd}
837
838 # Check the response of curl command is 200 or 204
839 ${check_no_content}=
840 ... Run Keyword and Return Status Should Contain ${out} 204
841 ${check_ok}=
842 ... Run Keyword and Return Status Should Contain ${out} 200
843 Pass Execution If ${check_no_content}==${TRUE}
844 ... OR ${check_ok}==${TRUE}
845 END
846
847
848Get AuthMethods Default Values
849 [Documentation] Get enabled/disabled status of all authmethods
850 ... from Redfish account service URI
851 [Arguments] ${authmethod}
852
853 # Description of argument(s):
854 # authmethod The authmethod property whose value needs to be
855 # retrieved from account service URI.
856 # Usage Example Get AuthMethods Default Values BasicAuth
857 # returns >> ${TRUE}
858 # Example:
859 # {
860 # "@odata.id": "/redfish/v1/AccountService",
861 # (...)
862 # "Oem": {
863 # "OpenBMC": {
864 # "AuthMethods": {
865 # "BasicAuth": true,
866 # "Cookie": true,
867 # "SessionToken": true,
868 # "TLS": true,
869 # "XToken": true
870 # }
871 # }
872 # }
873 # }
874
875 ${resp}= Redfish.Get Attribute ${REDFISH_ACCOUNTS_SERVICE_URI} Oem
876 ${authmethods}= Set Variable ${resp['OpenBMC']['AuthMethods']}
877 ${initial_value}= Get From Dictionary ${authmethods} ${authmethod}
878 Set Test Variable ${initial_value}
879
880Check XToken Works Fine
881 [Documentation] Verify Xtoken works fine.
882 [Arguments] ${status_code}
883
884 # Description of Argument(s):
885 # status_code : 200, 401.
886
887 # Verify xtoken auth works for xtoken
888 Redfish.Get ${REDFISH_ACCOUNTS_SERVICE_URI}
889 ... valid_status_codes=[${status_code}]
890
891Check BasicAuth Works Fine
892 [Documentation] Verify Basic Auth works fine.
893 [Arguments] ${status_code}
894
895 # Description of Argument(s):
896 # status_code : 200, 401.
897
898 # Verify basic auth works based on basic auth.
899 ${cmd}= Catenate curl -k -i -u ${OPENBMC_USERNAME}:${OPENBMC_PASSWORD}
900 ... ${AUTH_URI}/redfish/v1/AccountService
901 ${rc} ${out}= Run And Return Rc And Output ${cmd}
902
903 # Check the response of curl command is 200/401
904 Should Contain ${out} ${status_code}
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500905
906
907Create User With Unsupported Password Format And Verify
908 [Documentation] Create admin or readonly user with unsupported password format
909 ... and verify.
910 [Arguments] ${username} ${role_id} ${password}
911
912 # Description of argument(s):
913 # username The username to be created.
914 # role_id The role ID of the user to be created
915 # (e.g. "Administrator", "ReadOnly").
916 # password The password to be assigned.
917 # Unsupported password format are sequential characters,
918 # sequential digits, palindrome digits, palindrome characters,
919 # only uppercase letters, only lowercase letters, only digits,
Sridevi Ramesh1a2d0452025-08-05 12:16:51 -0500920 # only characters, not a dictionary word, username and password
921 # should not be same.
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500922
923 # Make sure the user account in question does not already exist.
924 Redfish.Delete /redfish/v1/AccountService/Accounts/${userName}
925 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NOT_FOUND}]
926
927 # Create specified user with invalid password format.
928 ${payload}= Create Dictionary
929 ... UserName=${username} Password=${password} RoleId=${role_id} Enabled=${True}
930 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{payload}
931 ... valid_status_codes=[${HTTP_BAD_REQUEST}]
Sridevi Ramesh34acff52025-08-07 03:34:22 -0500932
933
934Verify Minimum Password Length For Redfish User
935 [Documentation] Verify minimum password length for new and existing admin or
936 ... readonly user.
937 [Arguments] ${user_name} ${role_id}
938
939 # Description of argument(s):
940 # user_name The username to be created.
941 # role_id The role ID of the user to be created.
942
943 # Make sure the user account in question does not already exist.
944 Redfish.Delete /redfish/v1/AccountService/Accounts/${user_name}
945 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NOT_FOUND}]
946
947 # Try to create a user with invalid length password.
948 ${payload}= Create Dictionary
949 ... UserName=${user_name} Password=UserPwd RoleId=${role_id} Enabled=${True}
950 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{payload}
951 ... valid_status_codes=[${HTTP_BAD_REQUEST}]
952
953 # Create specified user with valid length password.
954 Set To Dictionary ${payload} Password UserPwd1
955 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{payload}
956 ... valid_status_codes=[${HTTP_CREATED}]
957
958 # Try to change to an invalid password.
959 Redfish.Patch /redfish/v1/AccountService/Accounts/${user_name} body={'Password': 'UserPwd'}
960 ... valid_status_codes=[${HTTP_BAD_REQUEST}]
961
962 # Change to a valid password.
963 Redfish.Patch /redfish/v1/AccountService/Accounts/${user_name} body={'Password': 'UserPwd1'}
964
965 # Verify login.
966 Redfish.Logout
967 Redfish.Login ${user_name} UserPwd1
968 Redfish.Logout
969 Redfish.Login
970 Redfish.Delete /redfish/v1/AccountService/Accounts/${user_name}