*** Settings *** Documentation Connections and authentication module stability tests. Resource ../lib/bmc_redfish_resource.robot Resource ../lib/bmc_network_utils.robot Resource ../lib/openbmc_ffdc.robot Resource ../lib/resource.robot Resource ../lib/utils.robot Resource ../lib/connection_client.robot Resource ../gui/lib/gui_resource.robot Library ../lib/bmc_network_utils.py Library SSHLibrary Library Collections Library XvfbRobot Library OperatingSystem Library SeleniumLibrary 120 120 Library Telnet 30 Seconds Library Screenshot Suite Setup Redfish.Logout Variables ../gui/data/gui_variables.py *** Variables *** ${iterations} 10000 ${loop_iteration} ${1000} ${hostname} testhostname ${MAX_UNAUTH_PER_IP} ${5} ${bmc_url} https://${OPENBMC_HOST} *** Test Cases *** Test Patch Without Auth Token Fails [Documentation] Send patch method without auth token and verify it throws an error. [Tags] Test_Patch_Without_Auth_Token_Fails ${active_channel_config}= Get Active Channel Config ${ethernet_interface}= Set Variable ${active_channel_config['${CHANNEL_NUMBER}']['name']} Redfish.Patch ${REDFISH_NW_ETH_IFACE}${ethernet_interface} body={'HostName': '${hostname}'} ... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] Flood Patch Without Auth Token And Check Stability Of BMC [Documentation] Flood patch method without auth token and check BMC stability. [Tags] Flood_Patch_Without_Auth_Token_And_Check_Stability_Of_BMC @{fail_list}= Create List ${active_channel_config}= Get Active Channel Config ${ethernet_interface}= Set Variable ${active_channel_config['${CHANNEL_NUMBER}']['name']} FOR ${iter} IN RANGE ${1} ${iterations} + 1 Log To Console ${iter}th iteration Patch Request without valid session token # Expected valid fail status response code. Redfish.Patch ${REDFISH_NW_ETH_IFACE}${ethernet_interface} body={'HostName': '${hostname}'} ... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] # Every 100th iteration, check BMC allows patch with auth token. ${status}= Run Keyword If ${iter} % 100 == 0 Run Keyword And Return Status ... Login And Configure Hostname ${REDFISH_NW_ETH_IFACE}${ethernet_interface} Run Keyword If ${status} == False Append To List ${fail_list} ${iter} END ${verify_count}= Evaluate ${iterations}/100 ${fail_count}= Get Length ${fail_list} Should Be Equal As Integers ${fail_count} ${0} ... msg=Patch operation failed ${fail_count} times in ${verify_count} attempts; fails at iterations ${fail_list} Verify User Cannot Login After 5 Non-Logged In Sessions [Documentation] User should not be able to login when there ... are 5 non-logged in sessions. [Tags] Verify_User_Cannot_Login_After_5_Non-Logged_In_Sessions FOR ${iter} IN RANGE ${0} ${MAX_UNAUTH_PER_IP} SSHLibrary.Open Connection ${OPENBMC_HOST} Start Process ssh ${OPENBMC_USERNAME}@${OPENBMC_HOST} shell=True END SSHLibrary.Open Connection ${OPENBMC_HOST} ${status}= Run Keyword And Return Status SSHLibrary.Login ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} Should Be Equal ${status} ${False} Test Post Without Auth Token Fails [Documentation] Send post method without auth token and verify it throws an error. [Tags] Test_Post_Without_Auth_Token_Fails ${user_info}= Create Dictionary ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} ... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] Flood Post Without Auth Token And Check Stability Of BMC [Documentation] Flood post method without auth token and check BMC stability. [Tags] Flood_Post_Without_Auth_Token_And_Check_Stability_Of_BMC @{fail_list}= Create List ${user_info}= Create Dictionary ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} FOR ${iter} IN RANGE ${1} ${iterations} + 1 Log To Console ${iter}th iteration Post Request without valid session token # Expected valid fail status response code. Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} ... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] # Every 100th iteration, check BMC allows post with auth token. ${status}= Run Keyword If ${iter} % 100 == 0 Run Keyword And Return Status ... Login And Create User Run Keyword If ${status} == False Append To List ${fail_list} ${iter} END ${verify_count}= Evaluate ${iterations}/100 ${fail_count}= Get Length ${fail_list} Should Be Equal As Integers ${fail_count} ${0} ... msg=Post operation failed ${fail_count} times in ${verify_count} attempts; fails at iterations ${fail_list} Make Large Number Of Wrong SSH Login Attempts And Check Stability [Documentation] Check BMC stability with large number of SSH wrong login requests. [Tags] Make_Large_Number_Of_Wrong_SSH_Login_Attempts_And_Check_Stability [Setup] Set Account Lockout Threshold [Teardown] FFDC On Test Case Fail SSHLibrary.Open Connection ${OPENBMC_HOST} @{ssh_status_list}= Create List FOR ${iter} IN RANGE ${1} ${loop_iteration} + 1 Log To Console ${iter}th iteration ${invalid_password}= Catenate ${OPENBMC_PASSWORD}${iter} Run Keyword and Ignore Error ... Open Connection And Log In ${OPENBMC_USERNAME} ${invalid_password} # Every 100th iteration Login with correct credentials ${status}= Run keyword If ${iter} % ${100} == ${0} Run Keyword And Return Status ... Open Connection And Log In ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} Run Keyword If ${status} == ${False} Append To List ${ssh_status_list} ${status} SSHLibrary.Close Connection END ${valid_login_count}= Evaluate ${iterations}/100 ${fail_count}= Get Length ${ssh_status_list} Should Be Equal ${fail_count} ${0} ... msg= Login Failed ${fail_count} times in ${valid_login_count} attempts. Test Stability On Large Number Of Wrong Login Attempts To GUI [Documentation] Test stability on large number of wrong login attempts to GUI. [Tags] Test_Stability_On_Large_Number_Of_Wrong_Login_Attempts_To_GUI @{status_list}= Create List # Open headless browser. Start Virtual Display ${browser_ID}= Open Browser ${bmc_url} alias=browser1 Set Window Size 1920 1080 Go To ${bmc_url} FOR ${iter} IN RANGE ${1} ${iterations} + 1 Log To Console ${iter}th login Run Keyword And Ignore Error Login to GUI With Incorrect Credentials # Every 100th iteration, check BMC GUI is responsive. ${status}= Run Keyword If ${iter} % 100 == 0 Run Keyword And Return Status ... Open Browser ${bmc_url} Append To List ${status_list} ${status} Run Keyword If '${status}' == 'True' ... Run Keywords Close Browser AND Switch Browser browser1 END ${fail_count}= Count Values In List ${status_list} False Run Keyword If ${fail_count} > ${0} FAIL Could not open BMC GUI ${fail_count} times Test BMC GUI Stability On Continuous Refresh Of GUI Home Page [Documentation] Login to BMC GUI and keep refreshing home page and verify stability ... by login at times in another browser. [Tags] Test_BMC_GUI_Stability_On_Continuous_Refresh_Of_GUI_Home_Page [Teardown] Close All Browsers @{failed_list}= Create List # Open headless browser. Start Virtual Display ${browser_ID}= Open Browser ${bmc_url} alias=browser1 Set Window Size 1920 1080 Login GUI FOR ${iter} IN RANGE ${iterations} Log To Console ${iter}th Refresh of home page Refresh GUI Continue For Loop If ${iter}%100 != 0 # Every 100th iteration, check BMC GUI is responsive. ${status}= Run Keyword And Return Status ... Run Keywords Launch Browser And Login GUI AND Logout GUI Run Keyword If '${status}' == 'False' Append To List ${failed_list} ${iter} ... ELSE IF '${status}' == 'True' ... Run Keywords Close Browser AND Switch Browser browser1 END Log ${failed_list} ${fail_count}= Get Length ${failed_list} Run Keyword If ${fail_count} > ${0} FAIL Could not open BMC GUI ${fail_count} times Test BMCweb Stability On Continuous Redfish Login Attempts With Invalid Credentials [Documentation] Make invalid credentials Redfish login attempts continuously and ... verify bmcweb stability by login to Redfish with valid credentials. [Tags] Test_BMCweb_Stability_On_Continuous_Redfish_Login_Attempts_With_Invalid_Credentials Invalid Credentials Redfish Login Attempts Test User Delete Operation Without Session Token And Expect Failure [Documentation] Try to delete an object without valid session token and verifies it throws ... an unauthorised error. [Tags] Test_User_Delete_Operation_Without_Session_Token_And_Expect_Failure [Setup] Redfish.Logout Redfish.Delete /redfish/v1/AccountService/Accounts/test_user ... valid_status_codes=[${HTTP_UNAUTHORIZED}] Test Bmcweb Stability On Continuous Redfish Delete Operation Request Without Session Token [Documentation] Send delete object request without valid session token continuously and ... verify bmcweb stability by sending delete request with valid session token. [Tags] Test_Bmcweb_Stability_On_Continuous_Redfish_Delete_Operation_Request_Without_Session_Token @{failed_iter_list}= Create List FOR ${iter} IN RANGE ${iterations} Log To Console ${iter}th Redfish Delete Object Request without valid session token Run Keyword And Ignore Error ... Redfish.Delete /redfish/v1/AccountService/Accounts/test_user Continue For Loop If ${iter}%100 != 0 # Every 100th iteration, check delete operation with valid session token. ${status}= Run Keyword And Return Status ... Login And Delete User Run Keyword If '${status}' == 'False' Append To List ${failed_iter_list} ${iter} END Log ${failed_iter_list} ${fail_count}= Get Length ${failed_iter_list} Run Keyword If ${fail_count} > ${0} FAIL Could not do Redfish delete operation ${fail_count} times *** Keywords *** Login And Configure Hostname [Documentation] Login and configure hostname [Arguments] ${ethernet_interface_uri} [Teardown] Redfish.Logout # Description of argument(s): # ethernet_interface_uri Network interface URI path. Redfish.Login Redfish.Patch ${ethernet_interface_uri} body={'HostName': '${hostname}'} ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}] Login And Create User [Documentation] Login and create user [Teardown] Run Keywords Redfish.Delete /redfish/v1/AccountService/Accounts/test_user ... AND Redfish.Logout Redfish.Login ${user_info}= Create Dictionary ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} ... valid_status_codes=[${HTTP_OK}, ${HTTP_CREATED}] Login And Delete User [Documentation] Login create and delete user [Teardown] Redfish.Logout Redfish.Login ${user_info}= Create Dictionary ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} ... valid_status_codes=[${HTTP_OK}, ${HTTP_CREATED}] Redfish.Delete /redfish/v1/AccountService/Accounts/test_user Set Account Lockout Threshold [Documentation] Set user account lockout threshold. [Teardown] Redfish.Logout Redfish.Login Redfish.Patch /redfish/v1/AccountService body=[('AccountLockoutThreshold', 0)] Login to GUI With Incorrect Credentials [Documentation] Attempt to login to GUI as root, providing incorrect password argument. Input Text ${xpath_textbox_username} root Input Password ${xpath_textbox_password} incorrect_password Click Button ${xpath_login_button} Invalid Credentials Redfish Login Attempts [Documentation] Continuous invalid credentials login attempts to Redfish and ... login to Redfish with valid credentials at times and get failed login attempts. [Arguments] ${login_username}=${OPENBMC_USERNAME} ${login_password}=${OPENBMC_PASSWORD} # Description of argument(s): # login_username username for login user. # login_password password for login user. @{failed_iter_list}= Create List FOR ${iter} IN RANGE ${iterations} Log To Console ${iter}th Redfish login with invalid credentials Run Keyword And Ignore Error Redfish.Login ${login_username} incorrect_password Continue For Loop If ${iter}%100 != 0 # Every 100th iteration, check Redfish is responsive. ${status}= Run Keyword And Return Status ... Redfish.Login ${login_username} ${login_password} Run Keyword If '${status}' == 'False' Append To List ${failed_iter_list} ${iter} Redfish.Logout END Log ${failed_iter_list} ${fail_count}= Get Length ${failed_iter_list} Run Keyword If ${fail_count} > ${0} FAIL Could not Login to Redfish ${fail_count} times