1*** Settings ***
2Documentation       This suite tests IPMI Payload in OpenBMC.
3
4Resource            ../lib/ipmi_client.robot
5Resource            ../lib/openbmc_ffdc.robot
6Resource            ../lib/bmc_network_utils.robot
7Variables           ../data/ipmi_raw_cmd_table.py
8Library             ../lib/ipmi_utils.py
9
10
11Suite Setup         IPMI Payload Setup Execution
12Test Teardown       FFDC On Test Case Fail
13
14
15*** Variables ***
16${user_priv}                     2
17${operator_priv}                 3
18${admin_level_priv}              4
19${no_access_priv}                15
20${new_user_passwd}               0penBmc1
21${standard_payload_type_resp}    03 00
22${session_setup_payload_resp}    3f 00
23&{standard_payload_types}        ipmi_message=0  sol=1
24&{session_setup_payload_types}  RMCP+open_session_request=0x10
25                           ...  RMCP+open_session_response=0x11
26                           ...  RAKP_msg_1=0x12
27                           ...  RAKP_msg_2=0x13
28                           ...  RAKP_msg_3=0x14
29                           ...  RAKP_msg_4=0x15
30
31
32*** Test Cases ***
33
34Test Get Payload Activation Status
35    [Documentation]  Test get payload activation status.
36    [Tags]  Test_Get_Payload_Activation_Status
37
38    # SOL is the payload currently supported for payload status.
39    # Currently supports only one SOL session.
40    # Response Data
41    # 01   instance 1 is activated.
42    # 00   instance 1 is deactivated.
43    ${payload_status}=  Get Payload Activation Status
44    Should Contain Any  ${payload_status}  01  00
45
46
47Test Activate Payload
48    [Documentation]  Test activate payload via IPMI raw command.
49    [Tags]  Test_Activate_Payload
50
51    ${payload_status}=  Get Payload Activation Status
52    Run Keyword If  '${payload_status}' == '01'  Deactivate Payload
53
54    Activate Payload
55
56    ${payload_status}=  Get Payload Activation Status
57    Should Contain  ${payload_status}  01
58
59
60Test Deactivate Payload
61    [Documentation]  Test deactivate payload via IPMI raw command.
62    [Tags]  Test_Deactivate_Payload
63
64    ${payload_status}=  Get Payload Activation Status
65    Run Keyword If  '${payload_status}' == '00'  Activate Payload
66
67    Deactivate Payload
68
69    ${payload_status}=  Get Payload Activation Status
70    Should Contain  ${payload_status}  00
71
72
73Test Get Payload Instance Info
74    [Documentation]  Test Get Payload Instance via IPMI raw command.
75    [Tags]  Test_Get_Payload_Instance_Info
76
77    ${payload_status}=  Get Payload Activation Status
78    Run keyword If  '${payload_status}' == '01'
79    ...  Deactivate Payload
80
81    # First four bytes should be 00 if given instance is not activated.
82    ${resp}=  Run IPMI Command
83    ...  ${IPMI_RAW_CMD['Payload']['Get_Payload_Instance_Info'][0]}
84    Should Contain  ${resp}  ${IPMI_RAW_CMD['Payload']['Get_Payload_Instance_Info'][1]}
85    Activate Payload
86
87    # First four bytes should be session ID when payload is activated.
88    ${resp}=  Run IPMI Command
89    ...  ${IPMI_RAW_CMD['Payload']['Get_Payload_Instance_Info'][0]}
90    Should Not Contain  ${resp}  ${IPMI_RAW_CMD['Payload']['Get_Payload_Instance_Info'][1]}
91
92
93Verify Set User Access Payload For Standard Payload SOL
94    [Documentation]  Disable standard payload for SOL and verify IPMI sol activate command does not work.
95    [Tags]  Verify_Set_User_Access_Payload_For_Standard_Payload_SOL
96    [Teardown]  Run Keywords  Set User Access Payload For Given User  ${user_id_in_hex}
97    ...  AND  Delete Created User  ${userid}
98    ...  AND  FFDC On Test Case Fail
99
100    ${userid}  ${username}=  Create And Verify IPMI User
101    ${user_id_in_hex}=  Convert To Hex  ${userid}
102    ${userid_in_hex_format}=  Convert To Hex  ${userid}  prefix=0x  length=2
103
104    # Get default user access payload values.
105    ${default_user_access_payload}=  Get User Access Payload For Given Channel  ${userid_in_hex_format}
106
107    # Disable Standard payload 1 via set user access payload command.
108    Set User Access Payload For Given User  ${user_id_in_hex}  Disable
109
110    Verify Standard Payload  ${userid_in_hex_format}  ${username}  Disabled
111
112
113Verify Set User Access Payload For Operator Privileged User
114    [Documentation]  Try to set user access payload using operator privileged user and expect error.
115    [Tags]  Verify_Set_User_Access_Payload_For_Operator_Privileged_User
116    [Teardown]  Run Keywords  Delete Created User  ${userid}  AND  FFDC On Test Case Fail
117
118    ${userid}  ${username}=  Create And Verify IPMI User  ${operator_priv}  Operator
119
120    ${payload_raw_cmd}=  Catenate  ${IPMI_RAW_CMD['Payload']['Set_User_Access_Payload'][0]}
121    ...  ${CHANNEL_NUMBER} 0x${user_id} 0x02 0x00 0x00 0x00
122
123    Run Keyword and Expect Error  *Unable to establish IPMI*
124    ...  Run External IPMI Raw Command  ${payload_raw_cmd}  U=${userid}  P=${new_user_passwd}  L=Operator
125
126
127Verify Set User Access Payload For Invalid User
128    [Documentation]  Verify set user access payload IPMI command for invalid user.
129    [Tags]  Verify_Set_User_Access_Payload_For_Invalid_User
130
131    # Get Random invalid user ID.
132    ${invalid_userid}=  Get Invalid User ID
133
134    ${raw_cmd}=  Catenate   ${IPMI_RAW_CMD['Payload']['Set_User_Access_Payload'][0]}
135    ...  ${CHANNEL_NUMBER} ${invalid_userid} 0x02 0x00 0x00 0x00
136
137    Verify Invalid IPMI Command  ${raw_cmd}  0xcc
138
139
140Verify Set User Access Payload For Invalid Channel Number
141    [Documentation]  Verify set user access payload IPMI command for invalid channel number.
142    [Tags]  Verify_Set_User_Access_Payload_For_Invalid_Channel_Number
143    [Teardown]  Delete Created User  ${userid}
144
145    ${userid}  ${username}=  Create And Verify IPMI User
146
147    FOR  ${channel}  IN  @{inactive_channel_list}
148
149        Verify Set User Access Payload For Invalid Channel  ${userid}  ${channel}
150    END
151
152
153Verify Get User Access Payload For User Access privilege
154    [Documentation]   Verify get user access payload for user access(Read-only) privileged user.
155    [Tags]  Verify_Get_User_Access_Payload_For_User_Access_privilege
156    [Teardown]  Delete Created User  ${userid}
157
158    ${userid}  ${username}=  Create And Verify IPMI User  ${user_priv}  User
159
160    ${raw_command}=  Catenate  ${IPMI_RAW_CMD['Payload']['Get_User_Access_Payload'][0]}
161    ...  ${CHANNEL_NUMBER} ${user_id}
162
163    Run Keyword and Expect Error  *Unable to establish IPMI*
164    ...  Run External IPMI Raw Command  ${raw_command}  U=${userid}  P=${new_user_passwd}  L=User
165
166
167Verify Get User Access Payload For Invalid User
168    [Documentation]  Verify get user access payload IPMI command for invalid user.
169    [Tags]  Verify_Get_User_Access_Payload_For_Invalid_User
170
171    ${invalid_userid}=  Get Invalid User ID
172
173    Verify Get User Access Payload For Invalid User Or Channel  ${invalid_userid}  ${CHANNEL_NUMBER}
174
175
176Verify Get User Access Payload For Invalid Channel Number
177    [Documentation]  Verify get user access payload IPMI command for invalid channel number.
178    [Tags]  Verify_Get_User_Access_Payload_For_Invalid_Channel_Number
179    [Teardown]  Delete Created User  ${userid}
180
181    ${userid}  ${username}=  Create And Verify IPMI User
182    #${invalid_channels}=  Get Invalid Channel Number
183
184    FOR  ${channel}  IN  @{inactive_channel_list}
185        Verify Get User Access Payload For Invalid User Or Channel  ${userid}  ${channel}
186    END
187
188
189Verify Get Channel Payload Version
190    [Documentation]  Verify payload version for all supported payload type in
191                ...  all active channels.
192    [Tags]  Verify_Get_Channel_Payload_Version
193    [Template]  Verify Payload Version
194
195    FOR  ${channel}  IN  @{active_channel_list}
196        # Input Channel.
197        ${channel}
198    END
199
200Verify Get Channel Payload Version For Invalid Channel
201    [Documentation]  Verify get channel payload version IPMI command for invalid channel.
202    [Tags]  Verify_Get_Channel_Payload_Version_For_Invalid_Channel
203    [Template]  Verify Payload Version For Invalid Channel
204
205    FOR  ${invalid_channel_number}  IN  @{inactive_channel_list}
206        # channel number           payload types.
207        ${invalid_channel_number}   &{standard_payload_types}
208        ${invalid_channel_number}   &{session_setup_payload_types}
209    END
210
211
212Verify Get Channel Payload Support
213    [Documentation]  Verify get channel payload support IPMI command for active channels.
214    [Tags]  Verify_Get_Channel_Payload_Support
215    [Template]  Verify Payload Support
216
217    FOR  ${channel}  IN  @{active_channel_list}
218        # Input channel.
219        ${channel}
220    END
221
222Verify Get Channel Payload Support For Invalid Channel
223    [Documentation]  Verify get channel payload support IPMI command for invalid channels.
224    [Tags]  Verify_Get_Channel_Payload_Support_For_Invalid_Channel
225    [Template]  Verify Payload Support
226
227    FOR  ${channel}  IN  @{inactive_channel_list}
228       # Input channel.      Invalid channel intimation.
229       ${channel}            ${1}
230   END
231
232
233*** Keywords ***
234
235IPMI Payload Setup Execution
236    [Documentation]  Get active and inactive/invalid channels from channel_config.json file
237    ...              in list type and set it as suite variable.
238
239    # Get active channel list and set as a suite variable.
240    @{active_channel_list}=  Get Active Ethernet Channel List  current_channel=1
241    Set Suite Variable  @{active_channel_list}
242
243    # Get Inactive/Invalid channel list and set as a suite variable.
244    @{inactive_channel_list}=  Get Invalid Channel Number List
245    Set Suite Variable  @{inactive_channel_list}
246
247
248Get Payload Activation Status
249    [Documentation]  Get payload activation status.
250
251    ${resp}=  Run IPMI Command
252    ...  ${IPMI_RAW_CMD['Payload']['Get_Payload_Activation_Status'][0]}
253
254    @{resp}=  Split String  ${resp}
255
256    ${payload_status}=  Set Variable  ${resp[1]}
257
258    [return]  ${payload_status}
259
260
261Activate Payload
262    [Documentation]  Activate Payload.
263
264    ${resp}=  Run IPMI Command
265    ...  ${IPMI_RAW_CMD['Payload']['Activate_Payload'][0]}
266    Should Contain  ${resp}  ${IPMI_RAW_CMD['Payload']['Activate_Payload'][1]}
267
268
269Deactivate Payload
270    [Documentation]  Deactivate Payload.
271
272    ${resp}=  Run IPMI Command
273    ...  ${IPMI_RAW_CMD['Payload']['Deactivate_Payload'][0]}
274    Should Be Empty  ${resp}
275
276
277Get User Access Payload For Given Channel
278    [Documentation]  Execute get user access payload IPMI command for given channel
279    ...              and return response.
280    [Arguments]  ${user_id}  ${channel_number}=${CHANNEL_NUMBER}
281
282    # Description of argument(s):
283    # user_id         The user ID (e.g. "1", "2", etc.).
284    # channel_number  Input channel number(e.g. "1", "2").
285
286    ${raw_command}=  Catenate  ${IPMI_RAW_CMD['Payload']['Get_User_Access_Payload'][0]}
287    ...  ${channel_number} ${user_id}
288    ${resp}=  Run External IPMI Raw Command  ${raw_command}
289    [Return]  ${resp}
290
291
292Create And Verify IPMI User
293    [Documentation]  Create IPMI User, set password, set privilege and enable the user.
294    [Arguments]  ${user_privilege_level}=${admin_level_priv}   ${privilege}=Administrator
295
296    # Description of argument(s):
297    # user_privilege_level   User Privilege level in integer.
298    #                        (e.g. 4-Administrator, 3-Operator, 2-Readonly).
299    # privilege              User Privilege in Wordings.
300    #                        (e.g. "Administrator", "Operator", "ReadOnly").
301
302    ${random_user_id}  ${random_user_name}=  Create Random IPMI User
303    Set User Password  ${random_user_id}  ${new_user_passwd}  16
304    Set And Verify User Access Privilege  ${random_user_id}  ${user_privilege_level}
305    Verify Username And Password  ${random_user_name}  ${new_user_passwd}  L=${privilege}
306
307    [Return]  ${random_user_id}  ${random_user_name}
308
309
310Set User Password
311    [Documentation]  Set user password for given user ID.
312    [Arguments]  ${user_id}  ${password}  ${password_option}
313
314    # Description of argument(s):
315    # user_id          The user ID (e.g. "1", "2", etc.).
316    # password         The user password (e.g. "0penBmc", "0penBmc1", etc.).
317    # password_option  Password length option to be given in IPMI command (e.g. "16", "20").
318
319    Run IPMI Standard Command  user set password ${user_id} ${password} ${password_option}
320
321Set And Verify User Access Privilege
322    [Documentation]  Set User Access Privilege, enable and verify user for given user ID.
323    [Arguments]  ${user_id}  ${privilege_level}
324
325    # Description of argument(s):
326    # user_id           The user ID (e.g. "1", "2", etc.).
327    # privilege_level   User Privilege level in hex value.
328    #                   (e.g. 0x04-Administrator, 0x03-Operator, 0x02-Readonly).
329
330    Set Channel Access  ${_user_id}  ipmi=on privilege=${privilege_level}
331
332    # Delay added for user privilege to get set.
333    Sleep  5s
334
335    Enable IPMI User And Verify  ${user_id}
336
337
338Verify Username And Password
339    [Documentation]  Verify that newly created user is able to run IPMI command
340    ...  with given username and password.
341    [Arguments]  ${username}  ${password}  &{options}
342
343    # Description of argument(s):
344    # username    The user name (e.g. "root", "robert", etc.).
345    # password    The user password (e.g. "0penBmc", "0penBmc1", etc.).
346    # options     Additional ipmitool command options  (e.g "-L=Operator","-C=3").
347
348    Wait Until Keyword Succeeds  15 sec  5 sec  Run External IPMI Raw Command
349    ...  ${IPMI_RAW_CMD['Device GUID']['Get'][0]}  U=${username}  P=${password}  &{options}
350
351
352Verify Standard Payload
353    [Documentation]  Verify standard payload is disabled or enabled.
354    [Arguments]  ${user_id}  ${user_name}  ${standard_payload}=Enabled
355
356    # Description of argument(s):
357    # user_id            The user ID (e.g. "1", "2", etc.).
358    # username           The user name (e.g. "root", "robert", etc.).
359    # standard_payload   Enabled or Disabled.
360
361    # Verify the standard payload 1 (sol) is disabled.
362    ${get_user_access_payload}=  Get User Access Payload For Given Channel  ${user_id}
363    @{get_user_access_cmd_resp_list}=  Split String  ${get_user_access_payload}
364
365    Run Keyword If  '${standard_payload}' == 'Disabled'
366    ...  Should Be Equal  ${get_user_access_cmd_resp_list}[0]  00
367    ...  ELSE
368    ...  Should Be Equal  ${get_user_access_cmd_resp_list}[0]  02
369
370    Run Keyword If  '${standard_payload}' == 'Disabled'
371    ...  Verify Sol Activate Disabled  ${user_name}
372
373
374Verify Sol Activate Disabled
375    [Documentation]  Verify SOL activate IPMI command is not working.
376    [Arguments]  ${user_name}
377
378    # Description of argument(s):
379    # username    The user name (e.g. "root", "robert", etc.).
380
381    ${resp}=  Run External IPMI Standard Command
382    ...  sol activate  expected_rc=${1}  U=${username}  P=${new_user_passwd}
383
384    Should Contain  ${resp}  SOL payload disabled
385
386
387Set User Access Payload For Given User
388    [Documentation]  Set the user access payload on given user, channel and return response.
389    [Arguments]  ${user_id}  ${operation_mode}=Enable  ${oempayload_value}=0x00  ${standard_payload_value}=0x02
390
391    # Description of argument(s):
392    # user_id                  The user ID (e.g. "1", "2", etc.).
393    # operation_mode          Enable or Disable payload type.
394    # oempayload_value        Oempayload in hex (e.g. "0x00", "0x01", "0x02", "0x04" etc).
395    # standard_payload_value  Standard payload type IPMI or SOL.
396    #                         (e.g.  0x01 - IPMI, 0x02- SOL).
397
398    # If operation mode is disable 2nd byte of raw command is 4${user_id}.
399    # (e.g) 2n byte will be 0x4a (if user_id is a).
400    # If operation mode is enable 2nd byte of raw command is 0${user_id}.
401    # (e.g.) 3rd byte will be 0x0a (if user_id is a).
402    # 0x02- standard payload for SOL, 0x01 standard payload for IPMI.
403    # 3rd byte represent standard payload enables 1 (SOL).
404    # 4th to 6th byte represent standard payload enables 2 and OEM payload 1 & 2 respectively.
405
406    ${operation_mode_value}=  Set Variable If  '${operation_mode}' == 'Enable'
407    ...  0  4
408    ${set_cmd}=  Catenate  ${IPMI_RAW_CMD['Payload']['Set_User_Access_Payload'][0]}
409    ...  ${CHANNEL_NUMBER} 0x${operation_mode_value}${user_id} ${standard_payload_value} 0x00 ${oempayload_value} 0x00
410
411    ${resp}=  Run IPMI Command  ${set_cmd}
412
413    [Return]  ${resp}
414
415
416Get Invalid User ID
417    [Documentation]  Get random invalid user ID using "channel getaccess" IPMI standard command.
418
419    # Python module:  get_user_info(userid, channel_number=1)
420    ${user_info}=  Get User Info  ${EMPTY}  ${CHANNEL_NUMBER}
421    ${user_info}=  Filter Struct  ${user_info}  [('user_name', None)]  invert=1
422    ${empty_user_info}=  Filter Struct  ${user_info}  [('user_name', '')]
423    @{invalid_userid_list}=  Create List
424    FOR  ${user_record}  IN  @{empty_user_info}
425        Append To List  ${invalid_userid_list}  ${user_record['user_id']}
426    END
427    ${invalid_user_id}=  Evaluate  random.choice(${invalid_userid_list})  random
428
429    [Return]  ${invalid_user_id}
430
431
432Verify Set User Access Payload For Invalid Channel
433    [Documentation]  Verify set user payload command for invalid channels.
434    [Arguments]  ${user_id}  ${channel_number}
435
436    # Description of argument(s):
437    # user_id           The user ID (e.g. "1", "2", etc.).
438    # channel_number    Input channel number.
439
440    ${channel_number}=  Convert To Hex  ${channel_number}  prefix=0x
441    ${user_id}=  Convert To Hex  ${user_id}  prefix=0x
442    ${raw_cmd}=  Catenate   ${IPMI_RAW_CMD['Payload']['Set_User_Access_Payload'][0]}
443    ...  ${channel_number} ${user_id} 0x02 0x00 0x00 0x00
444
445    Verify Invalid IPMI Command  ${raw_cmd}  0xcc
446
447
448Verify Get User Access Payload For Invalid User Or Channel
449    [Documentation]  Verify get user payload command for invalid userid or invalid channels.
450    [Arguments]  ${user_id}  ${channel_number}
451
452    # Description of argument(s):
453    # user_id           The user ID (e.g. "1", "2", etc.).
454    # channel_number    Input channel number.
455
456    ${channel_number}=  Convert To Hex  ${channel_number}  prefix=0x
457    ${user_id}=  Convert To Hex  ${user_id}  prefix=0x
458    ${raw_cmd}=  Catenate  ${IPMI_RAW_CMD['Payload']['Get_User_Access_Payload'][0]}
459    ...  ${channel_number} ${user_id}
460
461    Verify Invalid IPMI Command  ${raw_cmd}  0xcc
462
463
464Verify Payload Type Version
465    [Documentation]  Verify supported payload version.
466    [Arguments]  ${channel_number}  &{payload_type_dict}
467
468    # Description of argument(s):
469    # channel_number     Input channel number.
470    # payload_type_dict  Supported payload type in dictionary type.
471    #                    standard_payload_types and session_setup_payload_types which we use
472    #                    in this keyword are defined in variable section.
473
474    FOR  ${payload_type_name}  ${payload_type_number}  IN  &{payload_type_dict}
475        ${get_cmd}=  Catenate  ${IPMI_RAW_CMD['Payload']['Get_Channel_Payload_Version'][0]}
476        ...  ${channel_number} ${payload_type_number}
477
478        ${resp}=  Run External IPMI Raw Command  ${get_cmd}
479        ${resp}=  Strip String  ${resp}
480        Should Be Equal  ${resp}  10
481    END
482
483
484Verify Payload Version For Invalid Channel
485    [Documentation]  Verify payload version for invalid channel.
486    [Arguments]  ${channel_number}  &{payload_type_dict}
487
488    # Description of argument(s):
489    # channel_number     Input channel number.
490    # payload_type_dict  Supported payload type in dictionary type.
491    #                    standard_payload_types and session_setup_payload_types which we use
492    #                    in this keyword are defined in variable section.
493
494     ${channel_number}=  Convert To Hex  ${channel_number}  prefix=0x
495     FOR  ${payload_type_name}  ${payload_type_number}  IN  &{payload_type_dict}
496        ${get_cmd}=  Catenate  ${IPMI_RAW_CMD['Payload']['Get_Channel_Payload_Version'][0]}
497        ...  ${channel_number} ${payload_type_number}
498
499        Verify Invalid IPMI Command  ${get_cmd}  0xcc
500     END
501
502
503Verify Payload Version
504    [Documentation]  Verify supported payload version on given channel number.
505    [Arguments]  ${channel_number}
506
507    # Description of argument(s):
508    # channel_number     Input channel number.
509
510    Verify Payload Type Version  ${channel_number}  &{standard_payload_types}
511    Verify Payload Type Version  ${channel_number}  &{session_setup_payload_types}
512
513
514Verify Payload Support
515    [Documentation]  Verify payload support on given channel number.
516    [Arguments]  ${channel_number}  ${invalid_channel}=${0}
517
518    # Description of argument(s):
519    # channel_number     Input channel number.
520    # invalid_channel    This argument indicates whether we checking payload support command
521    #                    for Invalid channel or not.
522    #                    (e.g. 1 indicates checking for invalid channel, 0 indicates valid channel).
523
524    ${channel_number}=  Convert To Hex  ${channel_number}  prefix=0x
525    ${raw_cmd}=  Catenate  ${IPMI_RAW_CMD['Payload']['Get_Channel_Payload_Support'][0]}  ${channel_number}
526
527    Run Keyword And Return If  '${invalid_channel}' == '${1}'
528    ...  Verify Invalid IPMI Command  ${raw_cmd}  0xcc
529
530    # will be executed only if invalid_channel == 0.
531    ${resp}=  Run External IPMI Raw Command  ${raw_cmd}
532
533    ${resp}=  Strip String  ${resp}
534    ${expected_resp}=  Catenate  ${standard_payload_type_resp}  ${session_setup_payload_resp} 00 00 00 00
535    Should Be Equal  ${expected_resp}  ${resp}
536