blob: a6bc062856b653a438d4c76430992715314f7938 [file] [log] [blame]
George Keishing4c394012019-02-01 06:03:02 -06001*** Settings ***
Joy Onyerikwudbfe97d2019-03-11 19:44:56 -05002Documentation Test Redfish service root login security.
3
George Keishing85609902019-02-18 07:24:24 -06004Resource ../../lib/resource.robot
George Keishing4c394012019-02-01 06:03:02 -06005Resource ../../lib/bmc_redfish_resource.robot
George Keishing3298d5c2019-02-12 06:59:25 -06006Resource ../../lib/openbmc_ffdc.robot
7
8Test Teardown FFDC On Test Case Fail
Michael Walshc108e422019-03-28 12:27:18 -05009Test Setup Printn
George Keishing4c394012019-02-01 06:03:02 -060010
George Keishing374e6842019-02-20 08:57:18 -060011*** Variables ***
12
13${LOGIN_SESSION_COUNT} ${50}
14
George Keishing9edf5bc2019-04-09 15:07:28 -050015&{header_requirements} Strict-Transport-Security=max-age=31536000; includeSubdomains; preload
16... X-Frame-Options=DENY
17... Pragma=no-cache
18... Cache-Control=no-Store,no-Cache
19... Content-Security-Policy=default-src 'self'; img-src 'self' data:
20... X-XSS-Protection=1; mode=block
21... X-Content-Type-Options=nosniff
22
George Keishing4c394012019-02-01 06:03:02 -060023*** Test Cases ***
24
George Keishing5ee33d92019-02-02 12:33:25 -060025Redfish Login With Invalid Credentials
George Keishing4c394012019-02-01 06:03:02 -060026 [Documentation] Login to BMC web using invalid credential.
George Keishing5ee33d92019-02-02 12:33:25 -060027 [Tags] Redfish_Login_With_Invalid_Credentials
George Keishing4c394012019-02-01 06:03:02 -060028 [Template] Login And Verify Redfish Response
29
30 # Expect status Username Password
31 InvalidCredentialsError* ${OPENBMC_USERNAME} deadpassword
32 InvalidCredentialsError* groot ${OPENBMC_PASSWORD}
33 InvalidCredentialsError* ${EMPTY} ${OPENBMC_PASSWORD}
34 InvalidCredentialsError* ${OPENBMC_USERNAME} ${EMPTY}
35 InvalidCredentialsError* ${EMPTY} ${EMPTY}
36
37
George Keishing5ee33d92019-02-02 12:33:25 -060038Redfish Login Using Unsecured HTTP
George Keishinga8116932019-02-05 11:51:47 -060039 [Documentation] Login to BMC web through http unsecured.
George Keishing5ee33d92019-02-02 12:33:25 -060040 [Tags] Redfish_Login_Using_Unsecured_HTTP
George Keishinga8116932019-02-05 11:51:47 -060041
42 Create Session openbmc http://${OPENBMC_HOST}
43 ${data}= Create Dictionary
44 ... UserName=${OPENBMC_USERNAME} Password=${OPENBMC_PASSWORD}
45
46 ${headers}= Create Dictionary Content-Type=application/json
47
48 Run Keyword And Expect Error *Connection refused*
49 ... Post Request openbmc /redfish/v1/SessionService/Sessions
50 ... data=${data} headers=${headers}
51
52
George Keishingb2f07342019-02-09 05:21:45 -060053Redfish Login Using HTTPS Wrong Port 80 Protocol
54 [Documentation] Login to BMC web through wrong protocol port 80.
55 [Tags] Redfish_Login_Using_HTTPS_Wrong_Port_80_Protocol
56
57 Create Session openbmc https://${OPENBMC_HOST}:80
58 ${data}= Create Dictionary
59 ... UserName=${OPENBMC_USERNAME} Password=${OPENBMC_PASSWORD}
60
61 ${headers}= Create Dictionary Content-Type=application/json
62
63 Run Keyword And Expect Error *Connection refused*
64 ... Post Request openbmc /redfish/v1/SessionService/Sessions
65 ... data=${data} headers=${headers}
66
67
George Keishing374e6842019-02-20 08:57:18 -060068Create Multiple Login Sessions And Verify
69 [Documentation] Create 50 login instances and verify.
70 [Tags] Create_Multiple_Login_Sessions_And_Verify
71 [Teardown] Multiple Session Cleanup
72
George Keishing97c93942019-03-04 12:45:07 -060073 Redfish.Login
George Keishing374e6842019-02-20 08:57:18 -060074 # Example:
75 # {
76 # 'key': 'L0XEsZAXpNdF147jJaOD',
77 # 'location': '/redfish/v1/SessionService/Sessions/qWn2JOJSOs'
78 # }
George Keishing0b9d8ab2019-02-20 14:02:41 -060079 ${saved_session_info}= Get Redfish Session Info
George Keishing374e6842019-02-20 08:57:18 -060080
81 # Sessions book keeping for cleanup once done.
82 ${session_list}= Create List
83 Set Test Variable ${session_list}
84
85 Repeat Keyword ${LOGIN_SESSION_COUNT} times Create New Login Session
86
87 # Update the redfish session object with the first login key and location
88 # and verify if it is still working.
George Keishing97c93942019-03-04 12:45:07 -060089 Redfish.Set Session Key ${saved_session_info["key"]}
90 Redfish.Set Session Location ${saved_session_info["location"]}
91 Redfish.Get ${saved_session_info["location"]}
George Keishing374e6842019-02-20 08:57:18 -060092
93
George Keishing0b9d8ab2019-02-20 14:02:41 -060094Attempt Login With Expired Session
95 [Documentation] Authenticate to redfish, then log out and attempt to
96 ... use the session.
97 [Tags] Attempt_Login_With_Expired_Session
98
George Keishing97c93942019-03-04 12:45:07 -060099 Redfish.Login
George Keishing0b9d8ab2019-02-20 14:02:41 -0600100 ${saved_session_info}= Get Redfish Session Info
George Keishing97c93942019-03-04 12:45:07 -0600101 Redfish.Logout
George Keishing0b9d8ab2019-02-20 14:02:41 -0600102
103 # Attempt login with expired session.
104 # By default 60 minutes of inactivity closes the session.
George Keishing97c93942019-03-04 12:45:07 -0600105 Redfish.Set Session Key ${saved_session_info["key"]}
106 Redfish.Set Session Location ${saved_session_info["location"]}
George Keishing0b9d8ab2019-02-20 14:02:41 -0600107
George Keishing97c93942019-03-04 12:45:07 -0600108 Redfish.Get ${saved_session_info["location"]} valid_status_codes=[${HTTP_UNAUTHORIZED}]
George Keishing0b9d8ab2019-02-20 14:02:41 -0600109
110
George Keishing9edf5bc2019-04-09 15:07:28 -0500111Login And Verify HTTP Response Header
112 [Documentation] Login and verify redfish HTTP response header.
113 [Tags] Login_And_Verify_HTTP_Response_Header
114
115 # Example of HTTP redfish response header.
116 # Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
117 # X-Frame-Options: DENY
118 # Pragma: no-cache
119 # Cache-Control: no-Store,no-Cache
120 # Content-Security-Policy: default-src 'self'; img-src 'self' data:
121 # X-XSS-Protection: 1; mode=block
122 # X-Content-Type-Options: nosniff
123
124 Rprint Vars 1 header_requirements
125
126 Redfish.Login
127 ${resp}= Redfish.Get /redfish/v1/SessionService/Sessions
128
129 # The getheaders() method returns the headers as a list of tuples:
130 # headers:
131 # [Strict-Transport-Security]: max-age=31536000; includeSubdomains; preload
132 # [X-Frame-Options]: DENY
133 # [Pragma]: no-cache
134 # [Cache-Control]: no-Store,no-Cache
135 # [Content-Security-Policy]: default-src 'self'; img-src 'self' data:
136 # [X-XSS-Protection]: 1; mode=block
137 # [X-Content-Type-Options]: nosniff
138 # [X-UA-Compatible]: IE=11
139 # [Content-Type]: application/json
140 # [Server]: iBMC
141 # [Date]: Tue, 16 Apr 2019 17:49:46 GMT
142 # [Content-Length]: 2177
143
144 ${headers}= Key Value List To Dict ${resp.getheaders()}
145 Rprint Vars 1 headers
146
147 Dictionary Should Contain Sub Dictionary ${headers} ${header_requirements}
148
149
George Keishing4c394012019-02-01 06:03:02 -0600150*** Keywords ***
151
152Login And Verify Redfish Response
153 [Documentation] Login and verify redfish response.
154 [Arguments] ${expected_response} ${username} ${password}
155
156 # Description of arguments:
157 # expected_response Expected REST status.
158 # username The username to be used to connect to the server.
159 # password The password to be used to connect to the server.
160
George Keishing5e6515e2019-03-12 14:22:33 -0500161 # The redfish object may preserve a valid username or password from the
162 # last failed login attempt. If we then try to login with a null username
163 # or password value, the redfish object may prefer the preserved value.
164 # Since we're testing bad path, we wish to avoid this scenario so we will
165 # clear these values.
166
167 Redfish.Set Username ${EMPTY}
168 Redfish.Set Password ${EMPTY}
169
170 Run Keyword And Expect Error ${expected_response}
171 ... Redfish.Login ${username} ${password}
George Keishing374e6842019-02-20 08:57:18 -0600172
173
174Create New Login Session
175 [Documentation] Multiple login session keys.
176
George Keishing97c93942019-03-04 12:45:07 -0600177 Redfish.Login
George Keishing374e6842019-02-20 08:57:18 -0600178 ${session_info}= Get Redfish Session Info
179
180 # Append the session location to the list.
181 # ['/redfish/v1/SessionService/Sessions/uDzihgDecs',
182 # '/redfish/v1/SessionService/Sessions/PaHF5brPPd']
183 Append To List ${session_list} ${session_info["location"]}
184
185
186Multiple Session Cleanup
187 [Documentation] Do the teardown for multiple sessions.
188
189 FFDC On Test Case Fail
190
191 :FOR ${item} IN @{session_list}
George Keishing97c93942019-03-04 12:45:07 -0600192 \ Redfish.Delete ${item}