*** Settings *** Documentation Test Redfish user account. Resource ../../lib/resource.robot Resource ../../lib/bmc_redfish_resource.robot Resource ../../lib/openbmc_ffdc.robot Test Setup Test Setup Execution Test Teardown Test Teardown Execution *** Variables *** ${account_lockout_duration} ${30} ${account_lockout_threshold} ${3} ** Test Cases ** Verify AccountService Available [Documentation] Verify Redfish account service is available. [Tags] Verify_AccountService_Available ${resp} = Redfish_utils.Get Attribute /redfish/v1/AccountService ServiceEnabled Should Be Equal As Strings ${resp} ${True} Verify Redfish User Persistence After Reboot [Documentation] Verify Redfish user persistence after reboot. [Tags] Verify_Redfish_User_Persistence_After_Reboot # Create Redfish users. Redfish Create User admin_user TestPwd123 Administrator ${True} Redfish Create User operator_user TestPwd123 Operator ${True} Redfish Create User user_user TestPwd123 User ${True} Redfish Create User callback_user TestPwd123 Callback ${True} # Reboot BMC. Redfish OBMC Reboot (off) stack_mode=normal Redfish.Login # Verify users after reboot. Redfish Verify User admin_user TestPwd123 Administrator ${True} Redfish Verify User operator_user TestPwd123 Operator ${True} Redfish Verify User user_user TestPwd123 User ${True} Redfish Verify User callback_user TestPwd123 Callback ${True} # Delete created users. Redfish.Delete ${REDFISH_ACCOUNTS_URI}admin_user Redfish.Delete ${REDFISH_ACCOUNTS_URI}operator_user Redfish.Delete ${REDFISH_ACCOUNTS_URI}user_user Redfish.Delete ${REDFISH_ACCOUNTS_URI}callback_user Redfish Create and Verify Users [Documentation] Create Redfish users with various roles. [Tags] Redfish_Create_and_Verify_Users [Template] Redfish Create And Verify User #username password role_id enabled admin_user TestPwd123 Administrator ${True} operator_user TestPwd123 Operator ${True} user_user TestPwd123 User ${True} callback_user TestPwd123 Callback ${True} Verify Redfish User with Wrong Password [Documentation] Verify Redfish User with Wrong Password. [Tags] Verify_Redfish_User_with_Wrong_Password [Template] Verify Redfish User with Wrong Password #username password role_id enabled wrong_password admin_user TestPwd123 Administrator ${True} alskjhfwurh operator_user TestPwd123 Operator ${True} 12j8a8uakjhdaosiruf024 user_user TestPwd123 User ${True} 12 callback_user TestPwd123 Callback ${True} !#@D#RF#@!D Verify Login with Deleted Redfish Users [Documentation] Verify login with deleted Redfish Users. [Tags] Verify_Login_with_Deleted_Redfish_Users [Template] Verify Login with Deleted Redfish User #username password role_id enabled admin_user TestPwd123 Administrator ${True} operator_user TestPwd123 Operator ${True} user_user TestPwd123 User ${True} callback_user TestPwd123 Callback ${True} Verify User Creation Without Enabling It [Documentation] Verify User Creation Without Enabling it. [Tags] Verify_User_Creation_Without_Enabling_It [Template] Verify Create User Without Enabling #username password role_id enabled admin_user TestPwd123 Administrator ${False} operator_user TestPwd123 Operator ${False} user_user TestPwd123 User ${False} callback_user TestPwd123 Callback ${False} Verify User Creation With Invalid Role Id [Documentation] Verify user creation with invalid role ID. [Tags] Verify_User_Creation_With_Invalid_Role_Id # Make sure the user account in question does not already exist. Redfish.Delete ${REDFISH_ACCOUNTS_URI}test_user ... valid_status_codes=[${HTTP_OK}, ${HTTP_NOT_FOUND}] # Create specified user. ${payload}= Create Dictionary ... UserName=test_user Password=TestPwd123 RoleId=wrongroleid Enabled=${True} Redfish.Post ${REDFISH_ACCOUNTS_URI} body=&{payload} ... valid_status_codes=[${HTTP_BAD_REQUEST}] Verify Error Upon Creating Same Users With Different Privileges [Documentation] Verify error upon creating same users with different privileges. [Tags] Verify_Error_Upon_Creating_Same_Users_With_Different_Privileges Redfish Create User test_user TestPwd123 Administrator ${True} # Create specified user. ${payload}= Create Dictionary ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} Redfish.Post ${REDFISH_ACCOUNTS_URI} body=&{payload} ... valid_status_codes=[${HTTP_BAD_REQUEST}] Redfish.Delete ${REDFISH_ACCOUNTS_URI}test_user Verify Modifying User Attributes [Documentation] Verify modifying user attributes. [Tags] Verify_Modifying_User_Attributes # Create Redfish users. Redfish Create User admin_user TestPwd123 Administrator ${True} Redfish Create User operator_user TestPwd123 Operator ${True} Redfish Create User user_user TestPwd123 User ${True} Redfish Create User callback_user TestPwd123 Callback ${True} Redfish.Login # Make sure the new user account does not already exist. Redfish.Delete ${REDFISH_ACCOUNTS_URI}newadmin_user ... valid_status_codes=[${HTTP_OK}, ${HTTP_NOT_FOUND}] # Update admin_user username using Redfish. ${payload}= Create Dictionary UserName=newadmin_user Redfish.Patch ${REDFISH_ACCOUNTS_URI}admin_user body=&{payload} # Update operator_user password using Redfish. ${payload}= Create Dictionary Password=NewTestPwd123 Redfish.Patch ${REDFISH_ACCOUNTS_URI}operator_user body=&{payload} # Update user_user role using Redfish. ${payload}= Create Dictionary RoleId=Operator Redfish.Patch ${REDFISH_ACCOUNTS_URI}user_user body=&{payload} # Update callback_user to disable using Redfish. ${payload}= Create Dictionary Enabled=${False} Redfish.Patch ${REDFISH_ACCOUNTS_URI}callback_user body=&{payload} # Verify users after updating Redfish Verify User newadmin_user TestPwd123 Administrator ${True} Redfish Verify User operator_user NewTestPwd123 Operator ${True} Redfish Verify User user_user TestPwd123 Operator ${True} Redfish Verify User callback_user TestPwd123 Callback ${False} # Delete created users. Redfish.Delete ${REDFISH_ACCOUNTS_URI}newadmin_user Redfish.Delete ${REDFISH_ACCOUNTS_URI}operator_user Redfish.Delete ${REDFISH_ACCOUNTS_URI}user_user Redfish.Delete ${REDFISH_ACCOUNTS_URI}callback_user Verify User Account Locked [Documentation] Verify user account locked upon trying with invalid password. [Tags] Verify_User_Account_Locked Redfish Create User admin_user TestPwd123 Administrator ${True} Redfish.Logout Redfish.Login ${payload}= Create Dictionary AccountLockoutThreshold=${account_lockout_threshold} ... AccountLockoutDuration=${account_lockout_duration} Redfish.Patch ${REDFISH_ACCOUNTS_SERVICE_URI} body=${payload} # Make ${account_lockout_threshold} failed login attempts. Repeat Keyword ${account_lockout_threshold} times ... Run Keyword And Expect Error InvalidCredentialsError* Redfish.Login admin_user abc123 # Verify that legitimate login fails due to lockout. Run Keyword And Expect Error InvalidCredentialsError* ... Redfish.Login admin_user TestPwd123 # Wait for lockout duration to expire and then verify that login works. Sleep ${account_lockout_duration}s Redfish.Login admin_user TestPwd123 Redfish.Logout Redfish.Login Redfish.Delete ${REDFISH_ACCOUNTS_URI}admin_user Verify Admin User Privilege [Documentation] Verify admin user privilege. [Tags] Verify_Admin_User_Privilege Redfish Create User admin_user TestPwd123 Administrator ${True} Redfish Create User operator_user TestPwd123 Operator ${True} Redfish Create User user_user TestPwd123 User ${True} # Change role ID of operator user with admin user. # Login with admin user. Redfish.Login admin_user TestPwd123 # Modify Role ID of Operator user. Redfish.Patch ${REDFISH_ACCOUNTS_URI}operator_user body={'RoleId': 'Administrator'} # Verify modified user. Redfish Verify User operator_user TestPwd123 Administrator ${True} # Change password of 'user' user with admin user. Redfish.Patch ${REDFISH_ACCOUNTS_URI}user_user body={'Password': 'NewTestPwd123'} # Verify modified user. Redfish Verify User user_user NewTestPwd123 User ${True} Redfish.Login Redfish.Delete ${REDFISH_ACCOUNTS_URI}admin_user Redfish.Delete ${REDFISH_ACCOUNTS_URI}operator_user Redfish.Delete ${REDFISH_ACCOUNTS_URI}user_user Verify Operator User Privilege [Documentation] Verify operator user privilege. [Tags] Verify_operator_User_Privilege Redfish Create User admin_user TestPwd123 Administrator ${True} Redfish Create User operator_user TestPwd123 Operator ${True} # Login with operator user. Redfish.Login operator_user TestPwd123 # Verify power on system. Redfish OBMC Reboot (off) stack_mode=normal # Attempt to change password of admin user with operator user. Redfish.Patch ${REDFISH_ACCOUNTS_URI}admin_user body={'Password': 'NewTestPwd123'} ... valid_status_codes=[${HTTP_UNAUTHORIZED}] Redfish.Login Redfish.Delete ${REDFISH_ACCOUNTS_URI}admin_user Redfish.Delete ${REDFISH_ACCOUNTS_URI}operator_user Verify 'User' User Privilege [Documentation] Verify 'user' user privilege. [Tags] Verify_User_User_Privilege Redfish Create User user_user TestPwd123 User ${True} # Read system level data. ${system_model}= Redfish_Utils.Get Attribute ... ${SYSTEM_BASE_URI} Model Redfish.Login Redfish.Delete ${REDFISH_ACCOUNTS_URI}user_user *** Keywords *** Test Setup Execution [Documentation] Do test case setup tasks. Redfish.Login Test Teardown Execution [Documentation] Do the post test teardown. FFDC On Test Case Fail Redfish.Logout Redfish Create User [Documentation] Redfish create user. [Arguments] ${username} ${password} ${role_id} ${enabled} # Description of argument(s): # username The username to be created. # password The password to be assigned. # role_id The role ID of the user to be created # (e.g. "Administrator", "Operator", etc.). # enabled Indicates whether the username being created # should be enabled (${True}, ${False}). Redfish.Login # Make sure the user account in question does not already exist. Redfish.Delete ${REDFISH_ACCOUNTS_URI}${userName} ... valid_status_codes=[${HTTP_OK}, ${HTTP_NOT_FOUND}] # Create specified user. ${payload}= Create Dictionary ... UserName=${username} Password=${password} RoleId=${role_id} Enabled=${enabled} Redfish.Post ${REDFISH_ACCOUNTS_URI} body=&{payload} ... valid_status_codes=[${HTTP_CREATED}] Redfish.Logout # Login with created user. Run Keyword If ${enabled} == ${False} ... Run Keyword And Expect Error InvalidCredentialsError* ... Redfish.Login ${username} ${password} ... ELSE ... Redfish.Login ${username} ${password} Run Keyword If ${enabled} == ${False} ... Redfish.Login Run Keyword If '${role_id}' == 'Callback' ... Run Keywords Redfish.Logout AND Redfish.Login # Validate Role ID of created user. ${role_config}= Redfish_Utils.Get Attribute ... ${REDFISH_ACCOUNTS_URI}${username} RoleId Should Be Equal ${role_id} ${role_config} Redfish Verify User [Documentation] Redfish user verification. [Arguments] ${username} ${password} ${role_id} ${enabled} # Description of argument(s): # username The username to be created. # password The password to be assigned. # role_id The role ID of the user to be created # (e.g. "Administrator", "Operator", etc.). # enabled Indicates whether the username being created # should be enabled (${True}, ${False}). # Trying to do a login with created user. ${status}= Run Keyword And Return Status Redfish.Login ${username} ${password} # Doing a check of the returned status. Should Be Equal ${status} ${enabled} # We do not need to login with created user (user could be in disabled status). Redfish.Login # Validate Role Id of user. ${role_config}= Redfish_Utils.Get Attribute ... ${REDFISH_ACCOUNTS_URI}${username} RoleId Should Be Equal ${role_id} ${role_config} Redfish Create And Verify User [Documentation] Redfish create and verify user. [Arguments] ${username} ${password} ${role_id} ${enabled} # Description of argument(s): # username The username to be created. # password The password to be assigned. # role_id The role ID of the user to be created # (e.g. "Administrator", "Operator", etc.). # enabled Indicates whether the username being created # should be enabled (${True}, ${False}). # Example: #{ #"@odata.context": "/redfish/v1/$metadata#ManagerAccount.ManagerAccount", #"@odata.id": "/redfish/v1/AccountService/Accounts/test1", #"@odata.type": "#ManagerAccount.v1_0_3.ManagerAccount", #"Description": "User Account", #"Enabled": true, #"Id": "test1", #"Links": { # "Role": { # "@odata.id": "/redfish/v1/AccountService/Roles/Administrator" # } #}, Redfish Create User ${username} ${password} ${role_id} ${enabled} Redfish Verify User ${username} ${password} ${role_id} ${enabled} # Delete Specified User Redfish.Delete ${REDFISH_ACCOUNTS_URI}${username} Verify Redfish User with Wrong Password [Documentation] Verify Redfish User with Wrong Password. [Arguments] ${username} ${password} ${role_id} ${enabled} ${wrong_password} # Description of argument(s): # username The username to be created. # password The password to be assigned. # role_id The role ID of the user to be created # (e.g. "Administrator", "Operator", etc.). # enabled Indicates whether the username being created # should be enabled (${True}, ${False}). # wrong_password Any invalid password. Redfish Create User ${username} ${password} ${role_id} ${enabled} # Attempt to login with created user with invalid password. Run Keyword And Expect Error InvalidCredentialsError* ... Redfish.Login ${username} ${wrong_password} Redfish.Login # Delete newly created user. Redfish.Delete ${REDFISH_ACCOUNTS_URI}${username} Verify Login with Deleted Redfish User [Documentation] Verify Login with Deleted Redfish User. [Arguments] ${username} ${password} ${role_id} ${enabled} # Description of argument(s): # username The username to be created. # password The password to be assigned. # role_id The role ID of the user to be created # (e.g. "Administrator", "Operator", etc.). # enabled Indicates whether the username being created # should be enabled (${True}, ${False}). Redfish Create User ${username} ${password} ${role_id} ${enabled} ${status}= Run Keyword And Return Status Redfish.Login ${username} ${password} # Doing a check of the rerurned status Should Be Equal ${status} ${True} Redfish.Login # Delete newly created user. Redfish.Delete ${REDFISH_ACCOUNTS_URI}${userName} # Attempt to login with deleted user account. Run Keyword And Expect Error InvalidCredentialsError* ... Redfish.Login ${username} ${password} Redfish.Login Verify Create User Without Enabling [Documentation] Verify Create User Without Enabling. [Arguments] ${username} ${password} ${role_id} ${enabled} # Description of argument(s): # username The username to be created. # password The password to be assigned. # role_id The role ID of the user to be created # (e.g. "Administrator", "Operator", etc.). # enabled Indicates whether the username being created # should be enabled (${True}, ${False}). Redfish.Login Redfish Create User ${username} ${password} ${role_id} ${enabled} Redfish.Logout # Login with created user. Run Keyword And Expect Error InvalidCredentialsError* ... Redfish.Login ${username} ${password} Redfish.Login # Delete newly created user. Redfish.Delete ${REDFISH_ACCOUNTS_URI}${username}