blob: 75a2adffdae9ed66661f6e82ff5a40e90e4f1c8f [file] [log] [blame]
Sivas SRR6aa101f2019-02-19 22:31:55 -06001*** Settings ***
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -05002Documentation Test suite for verifying Redfish admin, readonly operation user accounts.
Sivas SRR6aa101f2019-02-19 22:31:55 -06003
4Resource ../../lib/resource.robot
5Resource ../../lib/bmc_redfish_resource.robot
6Resource ../../lib/openbmc_ffdc.robot
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -05007Resource ../../lib/bmc_redfish_utils.robot
Sivas SRR6aa101f2019-02-19 22:31:55 -06008
manashsarma654cbc12021-09-23 02:28:12 -05009Library SSHLibrary
10
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -050011Test Setup Redfish.Login
Sivas SRR6aa101f2019-02-19 22:31:55 -060012Test Teardown Test Teardown Execution
13
Sridevi Rameshcf0c8b02025-09-17 06:22:35 -050014Test Tags User_Account
15
Sandhya Somashekar37122b62019-06-18 06:02:02 -050016*** Variables ***
17
18${account_lockout_duration} ${30}
19${account_lockout_threshold} ${3}
George Keishingf8e18192023-07-05 14:26:27 +053020${ssh_status} ${True}
21
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -050022*** Test Cases ***
Sivas SRR6aa101f2019-02-19 22:31:55 -060023
24Verify AccountService Available
Sivas SRRfa6831c2019-02-22 00:12:00 -060025 [Documentation] Verify Redfish account service is available.
Sivas SRR6aa101f2019-02-19 22:31:55 -060026 [Tags] Verify_AccountService_Available
27
George Keishing97c93942019-03-04 12:45:07 -060028 ${resp} = Redfish_utils.Get Attribute /redfish/v1/AccountService ServiceEnabled
Sivas SRR6aa101f2019-02-19 22:31:55 -060029 Should Be Equal As Strings ${resp} ${True}
30
Rahul Maheshwarid0aa72b2022-08-23 06:44:07 -050031
32Verify Redfish Admin User Persistence After Reboot
33 [Documentation] Verify Redfish admin user persistence after reboot.
34 [Tags] Verify_Redfish_Admin_User_Persistence_After_Reboot
35 [Setup] Run Keywords Redfish.Login AND
36 ... Redfish Create User admin_user TestPwd123 Administrator ${True}
37 [Teardown] Run Keywords Redfish.Delete /redfish/v1/AccountService/Accounts/admin_user
38 ... AND Test Teardown Execution
Sandhya Somashekara83fb472019-08-29 02:26:21 -050039
40 # Reboot BMC.
41 Redfish OBMC Reboot (off) stack_mode=normal
Sandhya Somashekara83fb472019-08-29 02:26:21 -050042
43 # Verify users after reboot.
44 Redfish Verify User admin_user TestPwd123 Administrator ${True}
Rahul Maheshwarid0aa72b2022-08-23 06:44:07 -050045
46
47Verify Redfish Operator User Persistence After Reboot
48 [Documentation] Verify Redfish operator user persistence after reboot.
49 [Tags] Verify_Redfish_Operator_User_Persistence_After_Reboot
50 [Setup] Run Keywords Redfish.Login AND
51 ... Redfish Create User operator_user TestPwd123 Operator ${True}
52 [Teardown] Run Keywords Redfish.Delete /redfish/v1/AccountService/Accounts/operator_user
53 ... AND Test Teardown Execution
54
55 # Reboot BMC.
56 Redfish OBMC Reboot (off) stack_mode=normal
57
58 # Verify users after reboot.
Sandhya Somashekara83fb472019-08-29 02:26:21 -050059 Redfish Verify User operator_user TestPwd123 Operator ${True}
Rahul Maheshwarid0aa72b2022-08-23 06:44:07 -050060
61
62Verify Redfish Readonly User Persistence After Reboot
63 [Documentation] Verify Redfish readonly user persistence after reboot.
64 [Tags] Verify_Redfish_Readonly_User_Persistence_After_Reboot
65 [Setup] Run Keywords Redfish.Login AND
66 ... Redfish Create User readonly_user TestPwd123 ReadOnly ${True}
67 [Teardown] Run Keywords Redfish.Delete /redfish/v1/AccountService/Accounts/readonly_user
68 ... AND Test Teardown Execution
69
70 # Reboot BMC.
71 Redfish OBMC Reboot (off) stack_mode=normal
72
73 # Verify users after reboot.
Anusha Dathatri4062b442020-02-03 04:39:15 -060074 Redfish Verify User readonly_user TestPwd123 ReadOnly ${True}
Sandhya Somashekara83fb472019-08-29 02:26:21 -050075
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -050076Redfish Create and Verify Admin User
77 [Documentation] Create a Redfish user with administrator role and verify.
George Keishingf5176902022-05-12 04:23:59 -050078 [Tags] Redfish_Create_and_Verify_Admin_User
Sandhya Somashekar00f59cc2019-03-05 03:39:47 -060079 [Template] Redfish Create And Verify User
80
Sandhya Somashekare92b1e62019-04-25 05:27:45 -050081 #username password role_id enabled
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -050082 admin_user TestPwd123 Administrator ${True}
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -050083
84
85Redfish Create and Verify Operator User
86 [Documentation] Create a Redfish user with operator role and verify.
87 [Tags] Redfish_Create_and_Verify_Operator_User
88 [Template] Redfish Create And Verify User
89
90 #username password role_id enabled
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -050091 operator_user TestPwd123 Operator ${True}
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -050092
93
94Redfish Create and Verify Readonly User
95 [Documentation] Create a Redfish user with readonly role and verify.
96 [Tags] Redfish_Create_and_Verify_Readonly_User
97 [Template] Redfish Create And Verify User
98
99 #username password role_id enabled
Anusha Dathatri4062b442020-02-03 04:39:15 -0600100 readonly_user TestPwd123 ReadOnly ${True}
Sivas SRR6aa101f2019-02-19 22:31:55 -0600101
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500102
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500103Verify Redfish Admin User Login With Wrong Password
104 [Documentation] Verify Redfish create admin user with valid password and make sure
105 ... admin user failed to login with wrong password.
106 [Tags] Verify_Redfish_Admin_User_Login_With_Wrong_Password
107 [Template] Verify Redfish User Login With Wrong Password
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500108
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500109 #username password role_id enabled wrong_password
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500110 admin_user TestPwd123 Administrator ${True} alskjhfwurh
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500111
112
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500113Verify Redfish Operator User Login With Wrong Password
114 [Documentation] Verify Redfish create operator user with valid password and make sure
George Keishingeeec7352025-10-14 09:58:59 +0530115 ... operator user failed to login with wrong password.
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500116 [Tags] Verify_Redfish_Operator_User_Login_With_Wrong_Password
117 [Template] Verify Redfish User Login With Wrong Password
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500118
119 #username password role_id enabled wrong_password
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500120 operator_user TestPwd123 Operator ${True} 12j8a8uakjhdaosiruf024
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500121
122
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500123Verify Redfish Readonly User Login With Wrong Password
124 [Documentation] Verify Redfish create readonly user with valid password and make sure
125 ... readonly user failed to login with wrong password.
126 [Tags] Verify_Redfish_Readonly_User_Login_With_Wrong_Password
127 [Template] Verify Redfish User Login With Wrong Password
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500128
129 #username password role_id enabled wrong_password
Anusha Dathatri4062b442020-02-03 04:39:15 -0600130 readonly_user TestPwd123 ReadOnly ${True} 12
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500131
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500132
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500133Verify Login with Deleted Redfish Admin User
134 [Documentation] Verify login with deleted Redfish admin user.
135 [Tags] Verify_Login_with_Deleted_Redfish_Admin_User
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500136 [Template] Verify Login with Deleted Redfish User
137
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500138 #username password role_id enabled
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500139 admin_user TestPwd123 Administrator ${True}
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500140
141
142Verify Login with Deleted Redfish Operator User
143 [Documentation] Verify login with deleted Redfish operator user.
144 [Tags] Verify_Login_with_Deleted_Redfish_Operator_User
145 [Template] Verify Login with Deleted Redfish User
146
147 #username password role_id enabled
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500148 operator_user TestPwd123 Operator ${True}
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500149
150
151Verify Login with Deleted Redfish Readonly User
152 [Documentation] Verify login with deleted Redfish readonly user.
153 [Tags] Verify_Login_with_Deleted_Redfish_Readonly_User
154 [Template] Verify Login with Deleted Redfish User
155
156 #username password role_id enabled
Anusha Dathatri4062b442020-02-03 04:39:15 -0600157 readonly_user TestPwd123 ReadOnly ${True}
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500158
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500159
160Verify Admin User Creation Without Enabling It
161 [Documentation] Verify admin user creation without enabling it.
162 [Tags] Verify_Admin_User_Creation_Without_Enabling_It
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500163 [Template] Verify Create User Without Enabling
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500164
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500165 #username password role_id enabled
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500166 admin_user TestPwd123 Administrator ${False}
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500167
168
169Verify Operator User Creation Without Enabling It
170 [Documentation] Verify operator user creation without enabling it.
171 [Tags] Verify_Operator_User_Creation_Without_Enabling_It
172 [Template] Verify Create User Without Enabling
173
174 #username password role_id enabled
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500175 operator_user TestPwd123 Operator ${False}
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500176
177
178Verify Readonly User Creation Without Enabling It
179 [Documentation] Verify readonly user creation without enabling it.
180 [Tags] Verify_Readonly_User_Creation_Without_Enabling_It
181 [Template] Verify Create User Without Enabling
182
183 #username password role_id enabled
Anusha Dathatri4062b442020-02-03 04:39:15 -0600184 readonly_user TestPwd123 ReadOnly ${False}
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500185
Rahul Maheshwaricbc4c0b2022-04-25 05:29:25 -0500186
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500187Verify User Creation With Invalid Role Id
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500188 [Documentation] Verify user creation with invalid role ID.
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500189 [Tags] Verify_User_Creation_With_Invalid_Role_Id
190
191 # Make sure the user account in question does not already exist.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600192 Redfish.Delete /redfish/v1/AccountService/Accounts/test_user
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500193 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NOT_FOUND}]
194
195 # Create specified user.
196 ${payload}= Create Dictionary
197 ... UserName=test_user Password=TestPwd123 RoleId=wrongroleid Enabled=${True}
Anusha Dathatri466816f2020-01-30 05:12:36 -0600198 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{payload}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500199 ... valid_status_codes=[${HTTP_BAD_REQUEST}]
200
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500201Verify Error Upon Creating Same Users With Different Privileges
202 [Documentation] Verify error upon creating same users with different privileges.
203 [Tags] Verify_Error_Upon_Creating_Same_Users_With_Different_Privileges
204
205 Redfish Create User test_user TestPwd123 Administrator ${True}
206
207 # Create specified user.
208 ${payload}= Create Dictionary
Nandish-Matti232a6f02023-04-07 05:54:32 -0500209 ... UserName=test_user Password=TestPwd123 RoleId=ReadOnly Enabled=${True}
Anusha Dathatri466816f2020-01-30 05:12:36 -0600210 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{payload}
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500211 ... valid_status_codes=[${HTTP_BAD_REQUEST}]
212
Anusha Dathatri466816f2020-01-30 05:12:36 -0600213 Redfish.Delete /redfish/v1/AccountService/Accounts/test_user
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500214
Rahul Maheshwari124ebef2022-08-23 12:06:59 -0500215
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500216Verify Modifying User Attributes
217 [Documentation] Verify modifying user attributes.
218 [Tags] Verify_Modifying_User_Attributes
Rahul Maheshwari124ebef2022-08-23 12:06:59 -0500219
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500220 # Create Redfish users.
221 Redfish Create User admin_user TestPwd123 Administrator ${True}
Anusha Dathatri4062b442020-02-03 04:39:15 -0600222 Redfish Create User readonly_user TestPwd123 ReadOnly ${True}
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500223
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500224 # Make sure the new user account does not already exist.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600225 Redfish.Delete /redfish/v1/AccountService/Accounts/newadmin_user
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500226 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NOT_FOUND}]
227
228 # Update admin_user username using Redfish.
229 ${payload}= Create Dictionary UserName=newadmin_user
Anusha Dathatri466816f2020-01-30 05:12:36 -0600230 Redfish.Patch /redfish/v1/AccountService/Accounts/admin_user body=&{payload}
George Keishing3f2902e2025-03-14 08:19:02 +0530231 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}]
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500232
Anusha Dathatri4062b442020-02-03 04:39:15 -0600233 # Update readonly_user role using Redfish.
Rahul Maheshwari124ebef2022-08-23 12:06:59 -0500234 ${payload}= Create Dictionary RoleId=Administrator
Anusha Dathatri466816f2020-01-30 05:12:36 -0600235 Redfish.Patch /redfish/v1/AccountService/Accounts/readonly_user body=&{payload}
George Keishing3f2902e2025-03-14 08:19:02 +0530236 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}]
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500237
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500238 # Verify users after updating
239 Redfish Verify User newadmin_user TestPwd123 Administrator ${True}
Rahul Maheshwari124ebef2022-08-23 12:06:59 -0500240 Redfish Verify User readonly_user TestPwd123 Administrator ${True}
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500241
242 # Delete created users.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600243 Redfish.Delete /redfish/v1/AccountService/Accounts/newadmin_user
Anusha Dathatri466816f2020-01-30 05:12:36 -0600244 Redfish.Delete /redfish/v1/AccountService/Accounts/readonly_user
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500245
Rahul Maheshwari124ebef2022-08-23 12:06:59 -0500246
247Verify Modifying Operator User Attributes
248 [Documentation] Verify modifying operator user attributes.
249 [Tags] Verify_Modifying_Operator_User_Attributes
250 [Setup] Run Keywords Redfish.Login AND
251 ... Redfish Create User operator_user TestPwd123 Operator ${True}
252 [Teardown] Run Keywords Redfish.Delete /redfish/v1/AccountService/Accounts/operator_user
253 ... AND Test Teardown Execution
254
255 # Update operator_user password using Redfish.
256 ${payload}= Create Dictionary Password=NewTestPwd123
257 Redfish.Patch /redfish/v1/AccountService/Accounts/operator_user body=&{payload}
Igor Kanyuka56a34f92025-11-14 06:27:29 -0800258 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}]
Rahul Maheshwari124ebef2022-08-23 12:06:59 -0500259
260 # Verify users after updating
261 Redfish Verify User operator_user NewTestPwd123 Operator ${True}
262
263
Sandhya Somashekar37122b62019-06-18 06:02:02 -0500264Verify User Account Locked
265 [Documentation] Verify user account locked upon trying with invalid password.
266 [Tags] Verify_User_Account_Locked
267
268 Redfish Create User admin_user TestPwd123 Administrator ${True}
269
Joy Onyerikwu1483ce02019-06-26 14:56:36 -0500270 ${payload}= Create Dictionary AccountLockoutThreshold=${account_lockout_threshold}
271 ... AccountLockoutDuration=${account_lockout_duration}
272 Redfish.Patch ${REDFISH_ACCOUNTS_SERVICE_URI} body=${payload}
George Keishing1f8db9c2025-04-01 21:37:44 +0530273 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}]
Sandhya Somashekar37122b62019-06-18 06:02:02 -0500274
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500275 Redfish.Logout
276
Sandhya Somashekar37122b62019-06-18 06:02:02 -0500277 # Make ${account_lockout_threshold} failed login attempts.
278 Repeat Keyword ${account_lockout_threshold} times
Vidya-Kalasappanavar4831f592025-04-21 04:17:21 -0500279 ... Run Keyword And Expect Error *InvalidCredentialsError* Redfish.Login admin_user abcd1234
Sandhya Somashekar37122b62019-06-18 06:02:02 -0500280
281 # Verify that legitimate login fails due to lockout.
Vidya-Kalasappanavar4831f592025-04-21 04:17:21 -0500282 Run Keyword And Expect Error *InvalidCredentialsError*
Sandhya Somashekar37122b62019-06-18 06:02:02 -0500283 ... Redfish.Login admin_user TestPwd123
284
Vidya-Kalasappanavar344c21d2025-07-01 12:21:05 -0500285 # Wait for lockout duration to expire and adding 5 sec delay to the account lock timeout
286 # ... then verify that login works.
287 ${total_wait_duartion}= Evaluate ${account_lockout_duration} + 5
288 Sleep ${total_wait_duartion}s
289
Sandhya Somashekar37122b62019-06-18 06:02:02 -0500290 Redfish.Login admin_user TestPwd123
291
292 Redfish.Logout
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500293
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500294 Redfish.Login
295
Anusha Dathatri466816f2020-01-30 05:12:36 -0600296 Redfish.Delete /redfish/v1/AccountService/Accounts/admin_user
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500297
aravinth0510746884b2022-09-29 16:04:07 +0000298
299Verify User Account Unlock
300 [Documentation] Verify manually unlocking the account before lockout time
301 [Tags] Verify_User_Account_Unlock
George Keishinga36926b2023-05-17 21:54:34 +0530302 [Teardown] Run Keywords Redfish.Logout
303 ... AND Redfish.Login
aravinth0510746884b2022-09-29 16:04:07 +0000304 ... AND Redfish.Delete /redfish/v1/AccountService/Accounts/test_user
305 ... AND SSHLibrary.Close All Connections
306
307 Redfish Create User test_user TestPwd123 Administrator ${True}
308
309 ${payload}= Create Dictionary
310 ... AccountLockoutThreshold=${account_lockout_threshold}
311 ... AccountLockoutDuration=${account_lockout_duration}
312 Redfish.Patch ${REDFISH_ACCOUNTS_SERVICE_URI} body=${payload}
Igor Kanyuka56a34f92025-11-14 06:27:29 -0800313 ... valid_status_codes=[${HTTP_OK},${HTTP_NO_CONTENT}]
aravinth0510746884b2022-09-29 16:04:07 +0000314
315 Redfish.Logout
316
317 # Make ${account_lockout_threshold} failed login attempts.
318 Repeat Keyword ${account_lockout_threshold} times
319 ... Run Keyword And Expect Error InvalidCredentialsError*
320 ... Redfish.Login test_user abc123
321
322 # Ensure SSH Login with locked account gets failed
323 SSHLibrary.Open Connection ${OPENBMC_HOST}
324 Run Keyword And Expect Error Authentication failed*
325 ... SSHLibrary.Login test_user TestPwd123
326
327 # Verify that legitimate login fails due to lockout.
328 Run Keyword And Expect Error InvalidCredentialsError*
329 ... Redfish.Login test_user TestPwd123
330
331 ${payload}= Create Dictionary Locked=${FALSE}
332
333 # Manually unlock the account before lockout threshold expires
334 Redfish.Login
335 Redfish.Patch ${REDFISH_ACCOUNTS_URI}test_user body=${payload}
Igor Kanyuka56a34f92025-11-14 06:27:29 -0800336 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}]
aravinth0510746884b2022-09-29 16:04:07 +0000337 Redfish.Logout
338
339 # Try redfish login with the recently unlocked account
340 Redfish.Login test_user TestPwd123
341
342 # Try SSH login with the unlocked account
343 SSHLibrary.Open Connection ${OPENBMC_HOST}
344 SSHLibrary.Login test_user TestPwd123
345
346
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500347Verify Admin User Privilege
348 [Documentation] Verify admin user privilege.
349 [Tags] Verify_Admin_User_Privilege
350
351 Redfish Create User admin_user TestPwd123 Administrator ${True}
Anusha Dathatri4062b442020-02-03 04:39:15 -0600352 Redfish Create User readonly_user TestPwd123 ReadOnly ${True}
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500353
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500354 Redfish.Logout
355
Rahul Maheshwari3bc08642022-08-23 12:49:48 -0500356 Redfish.Login admin_user TestPwd123
357
358 # Change password of 'readonly' user with admin user.
359 Redfish.Patch /redfish/v1/AccountService/Accounts/readonly_user body={'Password': 'NewTestPwd123'}
Igor Kanyuka56a34f92025-11-14 06:27:29 -0800360 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}]
Rahul Maheshwari3bc08642022-08-23 12:49:48 -0500361
362 # Verify modified user.
363 Redfish Verify User readonly_user NewTestPwd123 ReadOnly ${True}
364
365 # Note: Delete user would work here because a root login is
366 # performed as part of "Redfish Verify User" keyword's teardown.
367 Redfish.Delete /redfish/v1/AccountService/Accounts/admin_user
368 Redfish.Delete /redfish/v1/AccountService/Accounts/readonly_user
369
370
371Verify Operator User Role Change Using Admin Privilege User
372 [Documentation] Verify operator user role change using admin privilege user
373 [Tags] Verify_Operator_User_Role_Change_Using_Admin_Privilege_User
374
375 Redfish Create User admin_user TestPwd123 Administrator ${True}
376 Redfish Create User operator_user TestPwd123 Operator ${True}
377
378 Redfish.Logout
379
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500380 # Change role ID of operator user with admin user.
381 # Login with admin user.
382 Redfish.Login admin_user TestPwd123
383
384 # Modify Role ID of Operator user.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600385 Redfish.Patch /redfish/v1/AccountService/Accounts/operator_user body={'RoleId': 'Administrator'}
Igor Kanyuka56a34f92025-11-14 06:27:29 -0800386 ... valid_status_codes=[${HTTP_OK},${HTTP_NO_CONTENT}]
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500387
388 # Verify modified user.
389 Redfish Verify User operator_user TestPwd123 Administrator ${True}
390
Anusha Dathatri466816f2020-01-30 05:12:36 -0600391 Redfish.Delete /redfish/v1/AccountService/Accounts/admin_user
392 Redfish.Delete /redfish/v1/AccountService/Accounts/operator_user
Rahul Maheshwari3bc08642022-08-23 12:49:48 -0500393
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500394
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500395Verify Operator User Privilege
396 [Documentation] Verify operator user privilege.
George Keishing5236ec52022-01-31 12:07:58 -0600397 [Tags] Verify_Operator_User_Privilege
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500398
399 Redfish Create User admin_user TestPwd123 Administrator ${True}
400 Redfish Create User operator_user TestPwd123 Operator ${True}
401
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500402 Redfish.Logout
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500403 # Login with operator user.
404 Redfish.Login operator_user TestPwd123
405
George Keishing093c1bd2020-02-10 09:47:34 -0600406 # Verify BMC reset.
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500407 Run Keyword And Expect Error ValueError* Redfish BMC Reset Operation
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500408
409 # Attempt to change password of admin user with operator user.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600410 Redfish.Patch /redfish/v1/AccountService/Accounts/admin_user body={'Password': 'NewTestPwd123'}
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500411 ... valid_status_codes=[${HTTP_FORBIDDEN}]
412
413 Redfish.Logout
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500414
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500415 Redfish.Login
416
Anusha Dathatri466816f2020-01-30 05:12:36 -0600417 Redfish.Delete /redfish/v1/AccountService/Accounts/admin_user
418 Redfish.Delete /redfish/v1/AccountService/Accounts/operator_user
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500419
420
Anusha Dathatri4062b442020-02-03 04:39:15 -0600421Verify ReadOnly User Privilege
422 [Documentation] Verify ReadOnly user privilege.
423 [Tags] Verify_ReadOnly_User_Privilege
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500424
Anusha Dathatri4062b442020-02-03 04:39:15 -0600425 Redfish Create User readonly_user TestPwd123 ReadOnly ${True}
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500426 Redfish.Logout
427
428 # Login with read_only user.
429 Redfish.Login readonly_user TestPwd123
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500430
431 # Read system level data.
432 ${system_model}= Redfish_Utils.Get Attribute
433 ... ${SYSTEM_BASE_URI} Model
434
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500435 Redfish.Logout
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500436 Redfish.Login
Anusha Dathatri4062b442020-02-03 04:39:15 -0600437 Redfish.Delete ${REDFISH_ACCOUNTS_URI}readonly_user
Sandhya Somashekar7a237472019-07-15 02:06:39 -0500438
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500439
Sridevi Ramesh34acff52025-08-07 03:34:22 -0500440Verify Minimum Password Length For Redfish Admin And Readonly User
441 [Documentation] Verify minimum password length for new and existing admin or
442 ... readonly user.
443 [Template] Verify Minimum Password Length For Redfish User
Anusha Dathatri466816f2020-01-30 05:12:36 -0600444
Sridevi Ramesh34acff52025-08-07 03:34:22 -0500445 #username role_id
446 admin_user Administrator
447 readonly_user ReadOnly
Anusha Dathatri466816f2020-01-30 05:12:36 -0600448
449
Tony Lee94335f42021-02-04 15:16:39 +0800450Verify Standard User Roles Defined By Redfish
451 [Documentation] Verify standard user roles defined by Redfish.
452 [Tags] Verify_Standard_User_Roles_Defined_By_Redfish
453
454 ${member_list}= Redfish_Utils.Get Member List
455 ... /redfish/v1/AccountService/Roles
456
457 @{roles}= Create List
458 ... /redfish/v1/AccountService/Roles/Administrator
459 ... /redfish/v1/AccountService/Roles/Operator
460 ... /redfish/v1/AccountService/Roles/ReadOnly
461
462 List Should Contain Sub List ${member_list} ${roles}
463
464 # The standard roles are:
465
466 # | Role name | Assigned privileges |
467 # | Administrator | Login, ConfigureManager, ConfigureUsers, ConfigureComponents, ConfigureSelf |
468 # | Operator | Login, ConfigureComponents, ConfigureSelf |
469 # | ReadOnly | Login, ConfigureSelf |
470
471 @{admin}= Create List Login ConfigureManager ConfigureUsers ConfigureComponents ConfigureSelf
472 @{operator}= Create List Login ConfigureComponents ConfigureSelf
473 @{readOnly}= Create List Login ConfigureSelf
474
475 ${roles_dict}= create dictionary admin_privileges=${admin} operator_privileges=${operator}
476 ... readOnly_privileges=${readOnly}
477
478 ${resp}= redfish.Get /redfish/v1/AccountService/Roles/Administrator
479 List Should Contain Sub List ${resp.dict['AssignedPrivileges']} ${roles_dict['admin_privileges']}
480
481 ${resp}= redfish.Get /redfish/v1/AccountService/Roles/Operator
482 List Should Contain Sub List ${resp.dict['AssignedPrivileges']} ${roles_dict['operator_privileges']}
483
484 ${resp}= redfish.Get /redfish/v1/AccountService/Roles/ReadOnly
485 List Should Contain Sub List ${resp.dict['AssignedPrivileges']} ${roles_dict['readOnly_privileges']}
486
487
manashsarma4910aa22021-07-26 09:12:36 -0500488Verify Error While Deleting Root User
489 [Documentation] Verify error while deleting root user.
490 [Tags] Verify_Error_While_Deleting_Root_User
491
492 Redfish.Delete /redfish/v1/AccountService/Accounts/root valid_status_codes=[${HTTP_FORBIDDEN}]
493
494
manashsarma654cbc12021-09-23 02:28:12 -0500495Verify SSH Login Access With Admin User
George Keishingf8e18192023-07-05 14:26:27 +0530496 [Documentation] Verify that admin user have SSH login access.
497 ... By default, admin should have access but there could be
498 ... case where admin user shell access is restricted by design
499 ... in the community sphere..
manashsarma654cbc12021-09-23 02:28:12 -0500500 [Tags] Verify_SSH_Login_Access_With_Admin_User
501
Nandakumar Ba4887be2025-11-05 19:27:31 +0530502 #Create an admin user and verify SSH login.
503 Create Admin User And Verify SSH Login
manashsarma654cbc12021-09-23 02:28:12 -0500504
George Keishinge8015b32022-09-19 09:38:47 -0500505 Redfish.Login
506 Redfish.Delete /redfish/v1/AccountService/Accounts/new_admin
507
Nandakumar-AMI45830792025-10-30 13:15:15 +0530508Verify SSH Login Is Revoked For Deleted User
509 [Documentation] Verify SSH login access is revoked for deleted User.
510 [Tags] Verify_SSH_Login_Is_Revoked_For_Deleted_User
511
512 #Create an admin user and verify SSH login.
513 Create Admin User And Verify SSH Login
514
515 #Login with root user.
516 Redfish.Login
517
518 # Delete the admin user.
519 Redfish.Delete /redfish/v1/AccountService/Accounts/new_admin
520 ... valid_status_codes=[${HTTP_OK}]
521
522 # Attempt SSH login with Deleted user.
523 SSHLibrary.Open Connection ${OPENBMC_HOST}
524 Run Keyword And Expect Error Authentication failed*
525 ... SSHLibrary.Login new_admin TestPwd1
manashsarma654cbc12021-09-23 02:28:12 -0500526
aravinth0510746884b2022-09-29 16:04:07 +0000527Verify Configure BasicAuth Enable And Disable
528 [Documentation] Verify configure basicauth enable and disable
529 [Tags] Verify_Configure_BasicAuth_Enable_And_Disable
530 [Template] Template For Configure Auth Methods
531
532 # auth_method
533 BasicAuth
534 XToken
535
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500536
537Redfish Create and Verify Admin User With Invalid Password Format
538 [Documentation] Create a admin user with invalid password format and verify.
539 [Template] Create User With Unsupported Password Format And Verify
540 [Tags] Redfish_Create_and_Verify_Admin_User_With_Invalid_Password_Format
541
542 #username role_id password
543 admin_user Administrator snellens
544 admin_user Administrator 10000001
545 admin_user Administrator 12345678
546 admin_user Administrator abcdefgh
547 admin_user Administrator abf12345
548 admin_user Administrator helloworld
549 admin_user Administrator HELLOWORLD
550 admin_user Administrator &$%**!*@
551 admin_user Administrator Dictation
552
553
554Redfish Create and Verify Readonly User With Invalid Password Format
555 [Documentation] Create a readonly user with invalid password format and verify.
556 [Template] Create User With Unsupported Password Format And Verify
557 [Tags] Redfish_Create_and_Verify_Readonly_User_With_Invalid_Password_Format
558
559 #username role_id password
560 readonly_user ReadOnly snellens
561 readonly_user ReadOnly 10000001
562 readonly_user ReadOnly 12345678
563 readonly_user ReadOnly abcdefgh
564 readonly_user ReadOnly abf12345
565 readonly_user ReadOnly helloworld
566 readonly_user ReadOnly HELLOWORLD
567 readonly_user ReadOnly &$%**!*@
568 readonly_user ReadOnly Dictation
569
570
Sridevi Ramesh1a2d0452025-08-05 12:16:51 -0500571Verify Admin And Readonly User Password Is Not Same As Username
572 [Documentation] Verify that admin and readonly user creation is failed if
573 ... password is same as username.
574 [Template] Create User With Unsupported Password Format And Verify
575 [Tags] Verify_Admin_And_Readonly_User_Password_Is_Not_Same_As_Username
576
577 #username role_id password
578 AdminUser1 Administrator AdminUser1
579 ReadOnlyUser1 ReadOnly ReadOnlyUser1
580
IanLaiAMI597181e2025-10-07 12:03:59 +0800581Verify AccountService Unsupported Methods
582 [Documentation] Verify Unsupported methods of AccountService
583 [Tags] Verify_AccountService_Unsupported_Methods
584
585 # Put operation on Account Services
586 Redfish.Put /redfish/v1/AccountService
587 ... valid_status_codes=[${HTTP_METHOD_NOT_ALLOWED}]
588
589 # Post operation on Account Services
590 Redfish.Post /redfish/v1/AccountService
591 ... valid_status_codes=[${HTTP_METHOD_NOT_ALLOWED}]
592
593 # Delete operation on Account Services
594 Redfish.Delete /redfish/v1/AccountService
595 ... valid_status_codes=[${HTTP_METHOD_NOT_ALLOWED}]
596
Ian Lai63c31422025-10-27 12:32:24 +0800597Verify AccountService Roles Unsupported Methods
598 [Documentation] Verify Unsupported methods of AccountService/Roles
599 [Tags] Verify_AccountService_Roles_Unsupported_Methods
600
601 # Put operation on Account Services Roles
602 Redfish.Put /redfish/v1/AccountService/Roles
603 ... valid_status_codes=[${HTTP_METHOD_NOT_ALLOWED}]
604
605 # Post operation on Account Services Roles
606 Redfish.Post /redfish/v1/AccountService/Roles
607 ... valid_status_codes=[${HTTP_METHOD_NOT_ALLOWED}]
608
609 # Delete operation on Account Services Roles
610 Redfish.Delete /redfish/v1/AccountService/Roles
611 ... valid_status_codes=[${HTTP_METHOD_NOT_ALLOWED}]
612
613 # Patch operation on Account Services Roles
614 Redfish.Patch /redfish/v1/AccountService/Roles
615 ... valid_status_codes=[${HTTP_METHOD_NOT_ALLOWED}]
616
Nandakumar-AMI45830792025-10-30 13:15:15 +0530617Verify AccountService Roles Instance With Unsupported Methods
618 [Documentation] Verify Instance Roles for AccountService and Unsupported Methods
619 [Tags] Verify_AccountService_Roles_Instance_With_Unsupported_Methods
620
621 # GET Administrator Role Instance
622 Redfish.Get /redfish/v1/AccountService/Roles/Administrator
623 ... valid_status_codes=[${HTTP_OK}]
624
625 # GET Operator Role Instance
626 Redfish.Get /redfish/v1/AccountService/Roles/Operator
627 ... valid_status_codes=[${HTTP_OK}]
628
629 # GET ReadOnly RoleInstance
630 Redfish.Get /redfish/v1/AccountService/Roles/ReadOnly
631 ... valid_status_codes=[${HTTP_OK}]
632
633 # Post operation on Account Service Roles Instance
634 Redfish.Post /redfish/v1/AccountService/Roles/Administrator
635 ... valid_status_codes=[${HTTP_METHOD_NOT_ALLOWED}]
636
637 # Put operation on Account Service Roles Instance
638 Redfish.Put /redfish/v1/AccountService/Roles/Administrator
639 ... valid_status_codes=[${HTTP_METHOD_NOT_ALLOWED}]
640
641 # Patch operation on Account Service Roles Instance
642 Redfish.Patch /redfish/v1/AccountService/Roles/Administrator
643 ... valid_status_codes=[${HTTP_METHOD_NOT_ALLOWED}]
644
645 #Delete operation on Account Service Roles Instance
646 Redfish.Delete /redfish/v1/AccountService/Roles/Administrator
647 ... valid_status_codes=[${HTTP_METHOD_NOT_ALLOWED}]
Sridevi Ramesh1a2d0452025-08-05 12:16:51 -0500648
Sivas SRR6aa101f2019-02-19 22:31:55 -0600649*** Keywords ***
650
Sivas SRR6aa101f2019-02-19 22:31:55 -0600651Test Teardown Execution
652 [Documentation] Do the post test teardown.
653
Anusha Dathatridb769702020-02-12 01:02:30 -0600654 Run Keyword And Ignore Error Redfish.Logout
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500655 FFDC On Test Case Fail
656
Sandhya Somashekar00f59cc2019-03-05 03:39:47 -0600657
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500658Redfish Create User
659 [Documentation] Redfish create user.
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500660 [Arguments] ${username} ${password} ${role_id} ${enabled} ${login_check}=${True}
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500661
662 # Description of argument(s):
663 # username The username to be created.
664 # password The password to be assigned.
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500665 # role_id The role ID of the user to be created
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500666 # (e.g. "Administrator", "Operator", etc.).
667 # enabled Indicates whether the username being created
668 # should be enabled (${True}, ${False}).
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500669 # login_check Checks user login for created user.
670 # (e.g. ${True}, ${False}).
Sandhya Somashekar8c5b2492019-05-16 05:19:03 -0500671
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500672 # Make sure the user account in question does not already exist.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600673 Redfish.Delete /redfish/v1/AccountService/Accounts/${userName}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500674 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NOT_FOUND}]
675
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500676 # Create specified user.
677 ${payload}= Create Dictionary
678 ... UserName=${username} Password=${password} RoleId=${role_id} Enabled=${enabled}
Anusha Dathatri466816f2020-01-30 05:12:36 -0600679 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{payload}
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500680 ... valid_status_codes=[${HTTP_CREATED}]
681
Rahul Maheshwari9928b1d2021-07-19 04:59:55 -0500682 # Resetting faillock count as a workaround for issue
Anusha Dathatrif7268b52020-02-19 01:03:49 -0600683 # openbmc/phosphor-user-manager#4
Rahul Maheshwari638a5982024-04-19 07:35:15 -0500684 ${cmd}= Catenate /usr/sbin/faillock --user ${username} --reset
Alagiridhilipankb9c93772024-04-02 10:04:27 +0000685
Anusha Dathatrif7268b52020-02-19 01:03:49 -0600686 Bmc Execute Command ${cmd}
687
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500688 # Verify login with created user.
George Keishing79fc7f02025-05-02 00:37:49 +0530689 IF '${login_check}' == '${True}'
690 ${status}= Run Keyword And Return Status
691 ... Verify Redfish User Login ${username} ${password}
692 ELSE
693 ${status}= Set Variable ${False}
694 END
695
696 IF '${login_check}' == '${True}' Should Be Equal ${status} ${enabled}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500697
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500698 # Validate Role ID of created user.
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500699 ${role_config}= Redfish_Utils.Get Attribute
Anusha Dathatri466816f2020-01-30 05:12:36 -0600700 ... /redfish/v1/AccountService/Accounts/${username} RoleId
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500701 Should Be Equal ${role_id} ${role_config}
702
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500703
704Redfish Verify User
705 [Documentation] Redfish user verification.
706 [Arguments] ${username} ${password} ${role_id} ${enabled}
707
708 # Description of argument(s):
709 # username The username to be created.
710 # password The password to be assigned.
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500711 # role_id The role ID of the user to be created
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500712 # (e.g. "Administrator", "Operator", etc.).
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500713 # enabled Indicates whether the username being created
714 # should be enabled (${True}, ${False}).
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500715
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500716 ${status}= Verify Redfish User Login ${username} ${password}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500717 # Doing a check of the returned status.
718 Should Be Equal ${status} ${enabled}
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500719
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500720 # Validate Role Id of user.
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500721 ${role_config}= Redfish_Utils.Get Attribute
Anusha Dathatri466816f2020-01-30 05:12:36 -0600722 ... /redfish/v1/AccountService/Accounts/${username} RoleId
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500723 Should Be Equal ${role_id} ${role_config}
724
725
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500726Verify Redfish User Login
727 [Documentation] Verify Redfish login with given user id.
728 [Teardown] Run Keywords Run Keyword And Ignore Error Redfish.Logout AND Redfish.Login
729 [Arguments] ${username} ${password}
730
731 # Description of argument(s):
732 # username Login username.
733 # password Login password.
734
735 # Logout from current Redfish session.
George Keishing1cf2a422021-02-02 22:59:29 -0600736 # We don't really care if the current session is flushed out since we are going to login
737 # with new credential in next.
738 Run Keyword And Ignore Error Redfish.Logout
739
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500740 ${status}= Run Keyword And Return Status Redfish.Login ${username} ${password}
George Keishing409df052024-01-17 22:36:14 +0530741 RETURN ${status}
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500742
743
Sandhya Somashekar00f59cc2019-03-05 03:39:47 -0600744Redfish Create And Verify User
745 [Documentation] Redfish create and verify user.
746 [Arguments] ${username} ${password} ${role_id} ${enabled}
747
748 # Description of argument(s):
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500749 # username The username to be created.
750 # password The password to be assigned.
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500751 # role_id The role ID of the user to be created
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500752 # (e.g. "Administrator", "Operator", etc.).
753 # enabled Indicates whether the username being created
754 # should be enabled (${True}, ${False}).
Sandhya Somashekar00f59cc2019-03-05 03:39:47 -0600755
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500756 # Example:
757 #{
758 #"@odata.context": "/redfish/v1/$metadata#ManagerAccount.ManagerAccount",
759 #"@odata.id": "/redfish/v1/AccountService/Accounts/test1",
760 #"@odata.type": "#ManagerAccount.v1_0_3.ManagerAccount",
761 #"Description": "User Account",
762 #"Enabled": true,
763 #"Id": "test1",
764 #"Links": {
765 # "Role": {
766 # "@odata.id": "/redfish/v1/AccountService/Roles/Administrator"
767 # }
768 #},
769
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500770 Redfish Create User ${username} ${password} ${role_id} ${enabled}
Sandhya Somashekar00f59cc2019-03-05 03:39:47 -0600771
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500772 Redfish Verify User ${username} ${password} ${role_id} ${enabled}
Sandhya Somashekar00f59cc2019-03-05 03:39:47 -0600773
774 # Delete Specified User
Anusha Dathatri466816f2020-01-30 05:12:36 -0600775 Redfish.Delete /redfish/v1/AccountService/Accounts/${username}
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500776
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500777Verify Redfish User Login With Wrong Password
778 [Documentation] Verify Redfish User failed to login with wrong password.
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500779 [Arguments] ${username} ${password} ${role_id} ${enabled} ${wrong_password}
780
781 # Description of argument(s):
782 # username The username to be created.
783 # password The password to be assigned.
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500784 # role_id The role ID of the user to be created
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500785 # (e.g. "Administrator", "Operator", etc.).
786 # enabled Indicates whether the username being created
787 # should be enabled (${True}, ${False}).
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500788 # wrong_password Any invalid password.
789
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500790 Redfish Create User ${username} ${password} ${role_id} ${enabled}
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500791
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500792 Redfish.Logout
793
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500794 # Attempt to login with created user with invalid password.
795 Run Keyword And Expect Error InvalidCredentialsError*
796 ... Redfish.Login ${username} ${wrong_password}
797
798 Redfish.Login
799
800 # Delete newly created user.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600801 Redfish.Delete /redfish/v1/AccountService/Accounts/${username}
Sandhya Somashekar33aa48c2019-03-13 05:54:49 -0500802
803
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500804Verify Login with Deleted Redfish User
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500805 [Documentation] Verify Login with Deleted Redfish User.
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500806 [Arguments] ${username} ${password} ${role_id} ${enabled}
807
808 # Description of argument(s):
809 # username The username to be created.
810 # password The password to be assigned.
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500811 # role_id The role ID of the user to be created
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500812 # (e.g. "Administrator", "Operator", etc.).
813 # enabled Indicates whether the username being created
814 # should be enabled (${True}, ${False}).
815
Sandhya Somashekaraa280aa2019-04-01 04:15:06 -0500816 Redfish Create User ${username} ${password} ${role_id} ${enabled}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500817
818 # Delete newly created user.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600819 Redfish.Delete /redfish/v1/AccountService/Accounts/${userName}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500820
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500821 Redfish.Logout
822
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500823 # Attempt to login with deleted user account.
824 Run Keyword And Expect Error InvalidCredentialsError*
825 ... Redfish.Login ${username} ${password}
826
827 Redfish.Login
828
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500829
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500830Verify Create User Without Enabling
831 [Documentation] Verify Create User Without Enabling.
832 [Arguments] ${username} ${password} ${role_id} ${enabled}
833
834 # Description of argument(s):
835 # username The username to be created.
836 # password The password to be assigned.
Sandhya Somashekard7d46c02019-06-26 05:10:25 -0500837 # role_id The role ID of the user to be created
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500838 # (e.g. "Administrator", "Operator", etc.).
839 # enabled Indicates whether the username being created
840 # should be enabled (${True}, ${False}).
841
Anusha Dathatrie0dddcf2020-06-18 05:23:16 -0500842 Redfish Create User ${username} ${password} ${role_id} ${enabled} ${False}
Sandhya Somashekare92b1e62019-04-25 05:27:45 -0500843
844 Redfish.Logout
845
846 # Login with created user.
847 Run Keyword And Expect Error InvalidCredentialsError*
848 ... Redfish.Login ${username} ${password}
849
850 Redfish.Login
Sandhya Somashekaraf402ca2019-03-18 05:59:19 -0500851
852 # Delete newly created user.
Anusha Dathatri466816f2020-01-30 05:12:36 -0600853 Redfish.Delete /redfish/v1/AccountService/Accounts/${username}
George Keishing07fb41f2020-06-16 08:09:19 -0500854
aravinth0510746884b2022-09-29 16:04:07 +0000855Template For Configure Auth Methods
856 [Documentation] Template to configure auth methods.
857 [Arguments] ${auth_method}
858 [Teardown] Configure AuthMethods ${auth_method}=${initial_value}
859
860 # Description of Argument(s):
861 # authmethods The authmethod setting which needs to be
862 # set in account service URI.
863 # valid values BasicAuth, XToken.
864
865 Get AuthMethods Default Values ${auth_method}
866
867 # Patch basicauth to TRUE
868 Configure AuthMethods ${auth_method}=${TRUE}
869
George Keishing79fc7f02025-05-02 00:37:49 +0530870 IF "${auth_method}" == "XToken"
871 Check XToken Works Fine ${HTTP_OK}
872 ELSE
873 Check BasicAuth Works Fine ${HTTP_OK}
874 END
aravinth0510746884b2022-09-29 16:04:07 +0000875
876 # Patch basicauth to FALSE
877 Configure AuthMethods ${auth_method}=${FALSE}
878
George Keishing79fc7f02025-05-02 00:37:49 +0530879 IF "${auth_method}" == "BasicAuth"
880 Check BasicAuth Works Fine ${HTTP_UNAUTHORIZED}
881 ELSE
882 Check XToken Works Fine ${HTTP_UNAUTHORIZED}
883 END
aravinth0510746884b2022-09-29 16:04:07 +0000884
885Configure AuthMethods
886 [Documentation] Enable/disable authmethod types.
887 [Arguments] &{authmethods}
888
889 # Description of argument(s):
890 # authmethods The authmethod setting which needs to be
891 # set in account service URI.
892 # Usage Example Configure AuthMethods XToken=${TRUE} BasicAuth=${TRUE}
893 # This will set the value of "XToken" and "BasicAuth"
894 # property in accountservice uri to TRUE.
895
896 ${openbmc}= Create Dictionary AuthMethods=${authmethods}
897 ${oem}= Create Dictionary OpenBMC=${openbmc}
898 ${payload}= Create Dictionary Oem=${oem}
899
900 # Setting authmethod properties using Redfish session based auth
901 ${status}= Run Keyword And Return Status
902 ... Redfish.Patch ${REDFISH_BASE_URI}AccountService
903 ... body=${payload} valid_status_codes=[${HTTP_OK},${HTTP_NO_CONTENT}]
904
George Keishingc63bfe62023-11-15 19:09:59 +0530905 # Setting authmethod properties using basic auth in case the former fails
aravinth0510746884b2022-09-29 16:04:07 +0000906 IF ${status}==${FALSE}
907 # Payload dictionary pre-process to match json formatting
908 ${payload}= Convert To String ${payload}
909 ${payload}= Replace String ${payload} ' "
910 ${payload}= Replace String ${payload} False false
911 ${payload}= Replace String ${payload} True true
912
913 # Curl Command Framing for PATCH authmethod
914 ${cmd}= Catenate curl -k -i -u ${OPENBMC_USERNAME}:${OPENBMC_PASSWORD}
915 ... -X PATCH '${AUTH_URI}${REDFISH_ACCOUNTS_SERVICE_URI}'
916 ... -H 'content-type:application/json' -H 'If-Match:*'
917 ... -d '${payload}'
918 ${rc} ${out}= Run And Return Rc And Output ${cmd}
919
920 # Check the response of curl command is 200 or 204
921 ${check_no_content}=
922 ... Run Keyword and Return Status Should Contain ${out} 204
923 ${check_ok}=
924 ... Run Keyword and Return Status Should Contain ${out} 200
925 Pass Execution If ${check_no_content}==${TRUE}
926 ... OR ${check_ok}==${TRUE}
927 END
928
929
930Get AuthMethods Default Values
931 [Documentation] Get enabled/disabled status of all authmethods
932 ... from Redfish account service URI
933 [Arguments] ${authmethod}
934
935 # Description of argument(s):
936 # authmethod The authmethod property whose value needs to be
937 # retrieved from account service URI.
938 # Usage Example Get AuthMethods Default Values BasicAuth
939 # returns >> ${TRUE}
940 # Example:
941 # {
942 # "@odata.id": "/redfish/v1/AccountService",
943 # (...)
944 # "Oem": {
945 # "OpenBMC": {
946 # "AuthMethods": {
947 # "BasicAuth": true,
948 # "Cookie": true,
949 # "SessionToken": true,
950 # "TLS": true,
951 # "XToken": true
952 # }
953 # }
954 # }
955 # }
956
957 ${resp}= Redfish.Get Attribute ${REDFISH_ACCOUNTS_SERVICE_URI} Oem
958 ${authmethods}= Set Variable ${resp['OpenBMC']['AuthMethods']}
959 ${initial_value}= Get From Dictionary ${authmethods} ${authmethod}
960 Set Test Variable ${initial_value}
961
962Check XToken Works Fine
963 [Documentation] Verify Xtoken works fine.
964 [Arguments] ${status_code}
965
966 # Description of Argument(s):
967 # status_code : 200, 401.
968
969 # Verify xtoken auth works for xtoken
970 Redfish.Get ${REDFISH_ACCOUNTS_SERVICE_URI}
971 ... valid_status_codes=[${status_code}]
972
973Check BasicAuth Works Fine
974 [Documentation] Verify Basic Auth works fine.
975 [Arguments] ${status_code}
976
977 # Description of Argument(s):
978 # status_code : 200, 401.
979
980 # Verify basic auth works based on basic auth.
981 ${cmd}= Catenate curl -k -i -u ${OPENBMC_USERNAME}:${OPENBMC_PASSWORD}
982 ... ${AUTH_URI}/redfish/v1/AccountService
983 ${rc} ${out}= Run And Return Rc And Output ${cmd}
984
985 # Check the response of curl command is 200/401
986 Should Contain ${out} ${status_code}
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -0500987
988
989Create User With Unsupported Password Format And Verify
990 [Documentation] Create admin or readonly user with unsupported password format
991 ... and verify.
992 [Arguments] ${username} ${role_id} ${password}
993
994 # Description of argument(s):
995 # username The username to be created.
996 # role_id The role ID of the user to be created
997 # (e.g. "Administrator", "ReadOnly").
998 # password The password to be assigned.
999 # Unsupported password format are sequential characters,
1000 # sequential digits, palindrome digits, palindrome characters,
1001 # only uppercase letters, only lowercase letters, only digits,
Sridevi Ramesh1a2d0452025-08-05 12:16:51 -05001002 # only characters, not a dictionary word, username and password
1003 # should not be same.
Sridevi Ramesh4fc23cf2025-08-04 02:08:05 -05001004
1005 # Make sure the user account in question does not already exist.
1006 Redfish.Delete /redfish/v1/AccountService/Accounts/${userName}
1007 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NOT_FOUND}]
1008
1009 # Create specified user with invalid password format.
1010 ${payload}= Create Dictionary
1011 ... UserName=${username} Password=${password} RoleId=${role_id} Enabled=${True}
1012 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{payload}
1013 ... valid_status_codes=[${HTTP_BAD_REQUEST}]
Sridevi Ramesh34acff52025-08-07 03:34:22 -05001014
1015
1016Verify Minimum Password Length For Redfish User
1017 [Documentation] Verify minimum password length for new and existing admin or
1018 ... readonly user.
1019 [Arguments] ${user_name} ${role_id}
1020
1021 # Description of argument(s):
1022 # user_name The username to be created.
1023 # role_id The role ID of the user to be created.
1024
1025 # Make sure the user account in question does not already exist.
1026 Redfish.Delete /redfish/v1/AccountService/Accounts/${user_name}
1027 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NOT_FOUND}]
1028
1029 # Try to create a user with invalid length password.
1030 ${payload}= Create Dictionary
1031 ... UserName=${user_name} Password=UserPwd RoleId=${role_id} Enabled=${True}
1032 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{payload}
1033 ... valid_status_codes=[${HTTP_BAD_REQUEST}]
1034
1035 # Create specified user with valid length password.
1036 Set To Dictionary ${payload} Password UserPwd1
1037 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{payload}
1038 ... valid_status_codes=[${HTTP_CREATED}]
1039
1040 # Try to change to an invalid password.
1041 Redfish.Patch /redfish/v1/AccountService/Accounts/${user_name} body={'Password': 'UserPwd'}
1042 ... valid_status_codes=[${HTTP_BAD_REQUEST}]
1043
1044 # Change to a valid password.
1045 Redfish.Patch /redfish/v1/AccountService/Accounts/${user_name} body={'Password': 'UserPwd1'}
Igor Kanyuka56a34f92025-11-14 06:27:29 -08001046 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}]
Sridevi Ramesh34acff52025-08-07 03:34:22 -05001047
1048 # Verify login.
1049 Redfish.Logout
1050 Redfish.Login ${user_name} UserPwd1
1051 Redfish.Logout
1052 Redfish.Login
1053 Redfish.Delete /redfish/v1/AccountService/Accounts/${user_name}
Nandakumar-AMI45830792025-10-30 13:15:15 +05301054
1055Create Admin User And Verify SSH Login
1056 [Documentation] Create admin user and verify SSH login & logout.
1057
1058 # Create an admin User.
1059 Redfish Create User new_admin TestPwd1 Administrator ${True}
1060
1061 # Attempt SSH login with admin user.
1062 SSHLibrary.Open Connection ${OPENBMC_HOST}
1063 ${status}= Run Keyword And Return Status SSHLibrary.Login new_admin TestPwd1
1064
1065 # By default ssh_status is True, user can change the status via CLI
1066 # -v ssh_status:False
1067 Should Be Equal As Strings "${status}" "${ssh_status}"
1068
1069 # Close SSH connection for admin user.
1070 SSHLibrary.Close Connection