1*** Settings *** 2 3Documentation Module to test IPMI asset tag functionality. 4Resource ../lib/ipmi_client.robot 5Resource ../lib/openbmc_ffdc.robot 6Resource ../lib/bmc_network_utils.robot 7Resource ../lib/energy_scale_utils.robot 8Variables ../data/ipmi_raw_cmd_table.py 9Variables ../data/ipmi_variable.py 10Library ../lib/bmc_network_utils.py 11Library ../lib/ipmi_utils.py 12 13Suite Setup IPMI General Test Suite Setup 14Test Teardown FFDC On Test Case Fail 15 16Force Tags IPMI_General 17 18*** Test Cases *** 19 20Test Get Self Test Results via IPMI Raw Command 21 [Documentation] Get self test results via IPMI raw command and verify the output. 22 [Tags] Test_Get_Self_Test_Results_via_IPMI_Raw_Command 23 24 ${resp}= Run IPMI Standard Command raw ${IPMI_RAW_CMD['Self_Test_Results']['Get'][0]} 25 26 # 55h = No error. All Self Tests Passed. 27 # 56h = Self Test function not implemented in this controller. 28 Should Contain Any ${resp} 55 00 56 00 29 30 31Test Get Device GUID Via IPMI Raw Command 32 [Documentation] Get device GUID via IPMI raw command and verify it using Redfish. 33 [Tags] Test_Get_Device_GUID_Via_IPMI_Raw_Command 34 [Teardown] Run Keywords Redfish.Logout AND FFDC On Test Case Fail 35 # Get GUIDS via IPMI. 36 # This should match the /redfish/v1/Managers/${MANAGER_ID}'s UUID data. 37 ${guids}= Run IPMI Standard Command raw ${IPMI_RAW_CMD['Device GUID']['Get'][0]} 38 # Reverse the order and remove space delims. 39 ${guids}= Split String ${guids} 40 Reverse List ${guids} 41 ${guids}= Evaluate "".join(${guids}) 42 43 Redfish.Login 44 ${uuid}= Redfish.Get Attribute /redfish/v1/Managers/${MANAGER_ID} UUID 45 ${uuid}= Remove String ${uuid} - 46 47 Rprint Vars guids uuid 48 Valid Value uuid ['${guids}'] 49 50 51Verify Get Channel Info via IPMI 52 [Documentation] Verify get channel info via IPMI. 53 [Tags] Verify_Get_Channel_Info_via_IPMI 54 55 # Get channel info via ipmi command "ipmitool channel info [channel number]". 56 # Verify channel info with files "channel_access_volatile.json", "channel_access_nv.json" 57 # and "channel_config.json" in BMC. 58 59 # Example output from 'Get Channel Info': 60 # channel_info: 61 # [channel_0x2_info]: 62 # [channel_medium_type]: 802.3 LAN 63 # [channel_protocol_type]: IPMB-1.0 64 # [session_support]: multi-session 65 # [active_session_count]: 0 66 # [protocol_vendor_id]: 7154 67 # [volatile(active)_settings]: 68 # [alerting]: enabled 69 # [per-message_auth]: enabled 70 # [user_level_auth]: enabled 71 # [access_mode]: always available 72 # [Non-Volatile Settings]: 73 # [alerting]: enabled 74 # [per-message_auth]: enabled 75 # [user_level_auth]: enabled 76 # [access_mode]: always available 77 78 ${channel_info_ipmi}= Get Channel Info ${CHANNEL_NUMBER} 79 ${active_channel_config}= Get Active Channel Config 80 ${channel_volatile_data_config}= Get Channel Access Config /run/ipmi/channel_access_volatile.json 81 ${channel_nv_data_config}= Get Channel Access Config /var/lib/ipmi/channel_access_nv.json 82 83 Rprint Vars channel_info_ipmi 84 Rprint Vars active_channel_config 85 Rprint Vars channel_volatile_data_config 86 Rprint Vars channel_nv_data_config 87 88 Valid Value medium_type_ipmi_conf_map['${channel_info_ipmi['channel_0x${CHANNEL_NUMBER}_info']['channel_medium_type']}'] 89 ... ['${active_channel_config['${CHANNEL_NUMBER}']['channel_info']['medium_type']}'] 90 91 Valid Value protocol_type_ipmi_conf_map['${channel_info_ipmi['channel_0x${CHANNEL_NUMBER}_info']['channel_protocol_type']}'] 92 ... ['${active_channel_config['${CHANNEL_NUMBER}']['channel_info']['protocol_type']}'] 93 94 Valid Value channel_info_ipmi['channel_0x${CHANNEL_NUMBER}_info']['session_support'] 95 ... ['${active_channel_config['${CHANNEL_NUMBER}']['channel_info']['session_supported']}'] 96 97 Valid Value channel_info_ipmi['channel_0x${CHANNEL_NUMBER}_info']['active_session_count'] 98 ... ['${active_channel_config['${CHANNEL_NUMBER}']['active_sessions']}'] 99 # IPMI Spec: The IPMI Enterprise Number is: 7154 (decimal) 100 Valid Value channel_info_ipmi['channel_0x${CHANNEL_NUMBER}_info']['protocol_vendor_id'] ['7154'] 101 102 # Verify volatile(active)_settings 103 Valid Value disabled_ipmi_conf_map['${channel_info_ipmi['volatile(active)_settings']['alerting']}'] 104 ... ['${channel_volatile_data_config['${CHANNEL_NUMBER}']['alerting_disabled']}'] 105 106 Valid Value disabled_ipmi_conf_map['${channel_info_ipmi['volatile(active)_settings']['per-message_auth']}'] 107 ... ['${channel_volatile_data_config['${CHANNEL_NUMBER}']['per_msg_auth_disabled']}'] 108 109 Valid Value disabled_ipmi_conf_map['${channel_info_ipmi['volatile(active)_settings']['user_level_auth']}'] 110 ... ['${channel_volatile_data_config['${CHANNEL_NUMBER}']['user_auth_disabled']}'] 111 112 Valid Value access_mode_ipmi_conf_map['${channel_info_ipmi['volatile(active)_settings']['access_mode']}'] 113 ... ['${channel_volatile_data_config['${CHANNEL_NUMBER}']['access_mode']}'] 114 115 # Verify Non-Volatile Settings 116 Valid Value disabled_ipmi_conf_map['${channel_info_ipmi['non-volatile_settings']['alerting']}'] 117 ... ['${channel_nv_data_config['${CHANNEL_NUMBER}']['alerting_disabled']}'] 118 119 Valid Value disabled_ipmi_conf_map['${channel_info_ipmi['non-volatile_settings']['per-message_auth']}'] 120 ... ['${channel_nv_data_config['${CHANNEL_NUMBER}']['per_msg_auth_disabled']}'] 121 122 Valid Value disabled_ipmi_conf_map['${channel_info_ipmi['non-volatile_settings']['user_level_auth']}'] 123 ... ['${channel_nv_data_config['${CHANNEL_NUMBER}']['user_auth_disabled']}'] 124 125 Valid Value access_mode_ipmi_conf_map['${channel_info_ipmi['non-volatile_settings']['access_mode']}'] 126 ... ['${channel_nv_data_config['${CHANNEL_NUMBER}']['access_mode']}'] 127 128 129Test Get Channel Authentication Capabilities via IPMI 130 [Documentation] Verify channel authentication capabilities via IPMI. 131 [Tags] Test_Get_Channel_Authentication_Capabilities_via_IPMI 132 [Template] Verify Channel Auth Capabilities 133 134 FOR ${channel} IN @{active_channel_list} 135 FOR ${privilege} IN 4 3 2 136 # Input Channel Privilege Level 137 ${channel} ${privilege} 138 END 139 END 140 141 142Test Get Channel Authentication Capabilities IPMI Command For Invalid Channel 143 [Documentation] Verify get channel authentication capabilities for invalid channel. 144 [Tags] Test_Get_Channel_Authentication_Capabilities_IPMI_Command_For_Invalid_Channel 145 [Template] Verify Channel Auth Capabilities For Invalid Channel 146 147 FOR ${channel} IN @{inactive_channel_list} 148 # Input Channel 149 ${channel} 150 END 151 152 153Verify Get Channel Authentication Capabilities IPMI Raw Command With Invalid Data Length 154 [Documentation] Verify get channel authentication capabilities IPMI raw command with invalid data length. 155 [Tags] Verify_Get_Channel_Authentication_Capabilities_IPMI_Raw_Command_With_Invalid_Data_Length 156 [Template] Verify Channel Auth Command For Invalid Data Length 157 158 # Bytes 159 low 160 high 161 162 163Verify Set Session Privilege Level via IPMI Raw Command 164 [Documentation] Set session privilege with given privilege level and verify the response with 165 ... expected level. 166 [Tags] Verify_Set_Session_Privilege_Level_via_IPMI_Raw_Command 167 [Template] Set Session Privilege Level And Verify 168 169 # privilege_level expected_level 170 0x00 04 171 0x02 02 172 0x03 03 173 0x04 04 174 175 176Verify Set Invalid Session Privilege Level Via IPMI Raw Command 177 [Documentation] Verify set invalid session privilege level via IPMI raw command. 178 [Tags] Verify_Set_Invalid_Session_Privilege_Level_Via_IPMI_Raw_Command 179 [Template] Set Invalid Session Privilege Level And Verify 180 181 # invalid_privilege_level 182 0x01 183 0x05 184 0x06 185 0x07 186 0x0F 187 188 189Verify Close Session Via IPMI 190 [Documentation] Verify close session via IPMI. 191 [Tags] Verify_Close_Session_Via_IPMI 192 193 # The "close session command" can be tested with any out-of-band IPMI command. 194 # When the session is about to close, it will execute the close session command at the end. 195 196 ${cmd}= Catenate mc info -vvv 2>&1 | grep "Closed Session" 197 ${cmd_output}= Run External IPMI Standard Command ${cmd} 198 199 Should Contain ${cmd_output} Closed Session 200 201 202Verify Chassis Identify via IPMI 203 [Documentation] Set chassis identify using IPMI and verify. 204 [Tags] Verify_Chassis_Identify_via_IPMI 205 [Setup] Redfish.Login 206 [Teardown] Redfish.logout 207 208 # Set to default "chassis identify" and verify that LED blinks for 15s. 209 Run IPMI Standard Command chassis identify 210 Verify Identify LED State Via Redfish True 211 212 Sleep 18s 213 Verify Identify LED State Via Redfish False 214 215 # Set "chassis identify" to 10s and verify that the LED blinks for 10s. 216 Run IPMI Standard Command chassis identify 10 217 Verify Identify LED State Via Redfish True 218 219 Sleep 12s 220 Verify Identify LED State Via Redfish False 221 222 223Verify Chassis Identify Off And Force Identify On via IPMI 224 [Documentation] Set chassis identify to "off" and "force" using IPMI and verify. 225 [Tags] Verify_Chassis_Identify_Off_And_Force_Identify_On_via_IPMI 226 [Setup] Redfish.Login 227 [Teardown] Redfish.logout 228 229 # Set the LED to "Force Identify On". 230 Run IPMI Standard Command chassis identify force 231 Verify Identify LED State Via Redfish True 232 233 # Set "chassis identify" to 0 and verify that the LED turns off. 234 Run IPMI Standard Command chassis identify 0 235 Verify Identify LED State Via Redfish False 236 237 238Set Power Cap Value Via IPMI And Verify Using Redfish 239 [Documentation] Set power cap value via IPMI and verify using Redfish. 240 [Setup] Redfish.Login 241 [Teardown] Run Keywords Set Power Cap Value Via Redfish ${initial_power_value} AND Redfish.Logout 242 [Tags] Set_Power_Cap_Value_Via_IPMI_And_Verify_Using_Redfish 243 244 # Get initial power cap value via Redfish. 245 ${power_limit_watts}= Get System Power Cap Limit 246 ${initial_power_value}= Set Variable ${power_limit_watts['SetPoint']} 247 248 # Get the allowable min and max power cap value via Redfish. 249 ${min_power_value}= Set Variable ${power_limit_watts['AllowableMin']} 250 ${max_power_value}= Set Variable ${power_limit_watts['AllowableMax']} 251 252 # Generate a random power cap value within the allowable range. 253 ${random_power_cap}= Evaluate random.randint(${min_power_value}, ${max_power_value}) modules=random 254 255 # Set power cap value via IPMI. 256 Run Keyword Run IPMI Standard Command dcmi power set_limit limit ${random_power_cap} 257 258 # Verify the power cap value with the Redfish value. 259 ${updated_power_limits}= Get System Power Cap Limit 260 Should Be Equal ${updated_power_limits['SetPoint']} ${random_power_cap} 261 262 263Verify Power Cap Value Via IPMI 264 [Documentation] Verify the power cap value via IPMI, set to non-zero using Redfish 265 ... if initial power cap value is zero. 266 [Tags] Verify_Power_Cap_Value_Via_IPMI 267 [Setup] Redfish.Login 268 [Teardown] Run Keywords Set Power Cap Value Via Redfish ${redfish_power_value} AND Redfish.Logout 269 270 # Get power cap value via Redfish. 271 ${power_cap_limit}= Get System Power Cap Limit 272 273 # Get initial power cap value. 274 ${redfish_power_value}= Set Variable ${power_cap_limit['SetPoint']} 275 276 # Update power cap value via Redfish if the initial power cap value is zero. 277 IF ${redfish_power_value} == 0 278 # Get the allowable min and max power cap value via Redfish. 279 ${min_power_value}= Set Variable ${power_cap_limit['AllowableMin']} 280 ${max_power_value}= Set Variable ${power_cap_limit['AllowableMax']} 281 282 # Generate a random power cap value within the allowable range. 283 ${random_power_cap}= Evaluate random.randint(${min_power_value}, ${max_power_value}) modules=random 284 285 # Set power value via Redfish. 286 Set Power Cap Value Via Redfish ${random_power_cap} 287 ${redfish_power_value}= Set Variable ${random_power_cap} 288 END 289 290 # Get power cap value via IPMI. 291 ${cmd}= Catenate dcmi power get_limit | grep "Power Limit:" 292 ${resp}= Run IPMI Standard Command ${cmd} 293 294 # The output will be as below. 295 # Power Limit: 1472 Watts 296 297 # Truncate power limit: and watts from output. 298 ${output_limit}= Strip String ${resp} mode=left characters=Power Limit: 299 ${ipmi_power_cap_value}= Strip String ${output_limit} mode=both characters= Watts 300 301 # Perform a comparison of power cap values obtained from both IPMI and Redfish. 302 ${redfish_power_cap_value}= Convert To String ${redfish_power_value} 303 Should Be Equal ${ipmi_power_cap_value} ${redfish_power_cap_value} 304 305 306*** Keywords *** 307 308IPMI General Test Suite Setup 309 [Documentation] Get active and inactive/invalid channels from channel_config.json file 310 ... in list type and set it as suite variable. 311 312 # Get active channel list and set as suite variable. 313 @{active_channel_list}= Get Active Ethernet Channel List 314 Set Suite Variable @{active_channel_list} 315 316 # Get Inactive/Invalid channel list and set as suite variable. 317 @{inactive_channel_list}= Get Invalid Channel Number List 318 Set Suite Variable @{inactive_channel_list} 319 320 321Set Session Privilege Level And Verify 322 [Documentation] Set session privilege with given privilege level and verify the response with 323 ... expected level. 324 [Arguments] ${privilege_level} ${expected_level} 325 # Description of argument(s): 326 # privilege_level Requested Privilege Level. 327 # expected_level New Privilege Level (or present level if ‘return present privilege level’ 328 # was selected). 329 330 ${resp}= Run External IPMI Raw Command 331 ... 0x06 0x3b ${privilege_level} 332 Should Contain ${resp} ${expected_level} 333 334 335Set Invalid Session Privilege Level And Verify 336 [Documentation] Set invalid session privilege level and verify the response. 337 [Arguments] ${privilege_level} 338 # Description of argument(s): 339 # privilege_level Requested Privilege Level. 340 341 # Verify requested level exceeds Channel and/or User Privilege Limit. 342 ${msg}= Run Keyword And Expect Error * Run External IPMI Raw Command 343 ... 0x06 0x3b ${privilege_level} 344 345 # 0x05 is OEM proprietary level. 346 IF ${privilege_level} == 0x05 347 Should Contain ${msg} Unknown rsp=0x81 348 ELSE 349 # According to IPMI spec privilege level except 0x00-0x05, others are 350 # reserved. So if we try to set those privilege we will get rsp as 351 # 0xcc(Invalid data filed in request) 352 Should Contain ${msg} Invalid data field in request rsp=0xcc 353 END 354 355 356Verify Identify LED State Via Redfish 357 [Documentation] Verify that Redfish identify LED system with given state. 358 [Arguments] ${expected_state} 359 # Description of argument(s): 360 # expected_led_status Expected value of Identify LED. 361 362 # Get the following URI(s) and iterate to find the attribute IndicatorLED. 363 # Example: 364 # /redfish/v1/Systems/system 365 # /redfish/v1/Systems/hypervisor 366 367 # Python module: get_member_list(resource_path) 368 ${systems}= Redfish_Utils.Get Member List /redfish/v1/Systems 369 FOR ${system} IN @{systems} 370 ${led_value}= Redfish.Get Attribute ${system} LocationIndicatorActive 371 # Get attribute return None if IndicatorLED does not exist in the URI. 372 Continue For Loop If '${led_value}' == 'None' 373 Should Be True '${led_value}' == '${expected_state}' 374 END 375 376 377Verify Channel Auth Capabilities 378 [Documentation] Verify authentication capabilities for given channel and privilege. 379 [Arguments] ${channel} ${privilege_level} 380 381 # Description of argument(s): 382 # channel Interface channel number. 383 # privilege_level User Privilege level (e.g. 4-Administator, 3-Operator, 2-Readonly). 384 385 # Python module: get_channel_auth_capabilities(channel_number, privilege_level) 386 ${channel_auth_cap}= Get Channel Auth Capabilities ${channel} ${privilege_level} 387 Rprint Vars channel_auth_cap 388 389 Valid Value channel_auth_cap['channel_number'] ['${channel}'] 390 Valid Value channel_auth_cap['kg_status'] ['default (all zeroes)'] 391 Valid Value channel_auth_cap['per_message_authentication'] ['enabled'] 392 Valid Value channel_auth_cap['user_level_authentication'] ['enabled'] 393 Valid Value channel_auth_cap['non-null_user_names_exist'] ['yes'] 394 Valid Value channel_auth_cap['null_user_names_exist'] ['no'] 395 Valid Value channel_auth_cap['anonymous_login_enabled'] ['no'] 396 Valid Value channel_auth_cap['channel_supports_ipmi_v1.5'] ['no'] 397 Valid Value channel_auth_cap['channel_supports_ipmi_v2.0'] ['yes'] 398 399 400Verify Channel Auth Capabilities For Invalid Channel 401 [Documentation] Verify authentication capabilities of invalid channels. 402 [Arguments] ${channel} 403 404 # Description of argument(s): 405 # channel Interface channel number. 406 407 ${channel_in_hex}= Convert To Hex ${channel} prefix=0x 408 ${cmd}= Catenate ${IPMI_RAW_CMD['Get Channel Auth Cap']['get'][0]} ${channel_in_hex} 0x04 409 410 Verify Invalid IPMI Command ${cmd} 0xcc 411 412 413Verify Channel Auth Command For Invalid Data Length 414 [Documentation] Verify channel authentication command for invalid data length. 415 [Arguments] ${byte_length} 416 417 # Description of argument(s): 418 # byte_length high or low. 419 # e.g. high - add extra byte to request data like "0x06 0x38 0x01 0x04 0x01". 420 # low - reduce bytes in actual request data like "0x06 0x38". 421 422 ${req_cmd}= Run Keyword If '${byte_length}' == 'low' 423 ... Catenate ${IPMI_RAW_CMD['Get Channel Auth Cap']['get'][0]} ${CHANNEL_NUMBER} 424 ... ELSE 425 ... Catenate ${IPMI_RAW_CMD['Get Channel Auth Cap']['get'][0]} ${CHANNEL_NUMBER} 0x04 0x01 426 427 Verify Invalid IPMI Command ${req_cmd} 0xc7 428 429 430Set Power Cap Value Via Redfish 431 [Documentation] Set power cap value via Redfish. 432 [Arguments] ${power_cap_value} 433 434 # Description of argument(s): 435 # power_cap_value Power cap value which need to be set. 436 437 # Set power cap value based on argument. 438 Redfish.Patch /redfish/v1/Chassis/chassis/EnvironmentMetrics 439 ... body={"PowerLimitWatts":{"SetPoint": ${power_cap_value}}} 440 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}] 441