1*** Settings ***
2
3Documentation    VMI certificate exchange tests.
4
5Library          ../../lib/jobs_processing.py
6Resource         ../../lib/resource.robot
7Resource         ../../lib/bmc_redfish_resource.robot
8Resource         ../../lib/openbmc_ffdc.robot
9Resource         ../../lib/bmc_redfish_utils.robot
10Resource         ../../lib/utils.robot
11
12Suite Setup       Suite Setup Execution
13Test Teardown     FFDC On Test Case Fail
14Suite Teardown    Run Keyword And Ignore Error  Suite Teardown Execution
15
16Force Tags        Vmicert_Management
17
18
19*** Variables ***
20
21# users           User Name               password
22@{ADMIN}          admin_user              TestPwd123
23@{OPERATOR}       operator_user           TestPwd123
24@{ReadOnly}       readonly_user           TestPwd123
25@{NoAccess}       noaccess_user           TestPwd123
26# Removing Operator, need to add it back once support is given.
27&{USERS}          Administrator=${ADMIN}  ReadOnly=${ReadOnly}
28${VMI_BASE_URI}   /ibm/v1/
29
30
31*** Test Cases ***
32
33Get CSR Request Signed By VMI And Verify
34    [Documentation]  Get CSR request signed by VMI using different user roles and verify.
35    [Tags]  Get_CSR_Request_Signed_By_VMI_And_Verify
36    [Template]  Get Certificate Signed By VMI
37
38    # username           password             force_create  valid_csr  valid_status_code
39    ${OPENBMC_USERNAME}  ${OPENBMC_PASSWORD}  ${True}       ${True}    ${HTTP_OK}
40
41    # Send CSR request from operator user.
42    # operator_user        TestPwd123           ${False}      ${True}    ${HTTP_FORBIDDEN}
43
44    # Send CSR request from ReadOnly user.
45    readonly_user        TestPwd123           ${False}      ${True}    ${HTTP_FORBIDDEN}
46
47    # Send CSR request from NoAccess user.
48    # noaccess_user        TestPwd123           ${False}      ${True}    ${HTTP_FORBIDDEN}
49
50
51Get Root Certificate Using Different Privilege Users Role
52    [Documentation]  Get root certificate using different users.
53    [Tags]  Get_Root_Certificate_Using_Different_Privilege_Users_Role
54    [Template]  Get Root Certificate
55
56    # username     password    force_create  valid_csr  valid_status_code
57    # Request root certificate from admin user.
58    admin_user     TestPwd123  ${True}       ${True}    ${HTTP_OK}
59
60    # Request root certificate from operator user.
61    # operator_user  TestPwd123  ${False}      ${True}    ${HTTP_FORBIDDEN}
62
63    # Request root certificate from ReadOnly user.
64    readonly_user  TestPwd123  ${False}      ${True}    ${HTTP_FORBIDDEN}
65
66    # Request root certificate from NoAccess user.
67    # noaccess_user  TestPwd123  ${False}      ${True}    ${HTTP_FORBIDDEN}
68
69
70Send CSR Request When VMI Is Off And Verify
71    [Documentation]  Send CSR signing request to VMI when it is off and expect an error.
72    [Tags]  Send_CSR_Request_When_VMI_Is_Off_And_Verify
73    [Setup]  Redfish Power Off
74    [Teardown]  Run keywords  Redfish Power On  stack_mode=skip  AND  FFDC On Test Case Fail
75    [Template]  Get Certificate Signed By VMI
76
77    # username           password             force_create  valid_csr  valid_status_code         read_timeout
78    ${OPENBMC_USERNAME}  ${OPENBMC_PASSWORD}  ${True}       ${True}    ${HTTP_SERVICE_UNAVAILABLE}   60
79
80    # Send CSR request from operator user.
81    # operator_user        TestPwd123           ${False}      ${True}    ${HTTP_FORBIDDEN}
82
83    # Send CSR request from ReadOnly user.
84    readonly_user        TestPwd123           ${False}      ${True}    ${HTTP_FORBIDDEN}
85
86    # Send CSR request from NoAccess user.
87    # noaccess_user        TestPwd123           ${False}      ${True}    ${HTTP_FORBIDDEN}
88
89
90Get Corrupted CSR Request Signed By VMI And Verify
91    [Documentation]  Send corrupted CSR for signing and expect an error.
92    [Tags]  Get_Corrupted_CSR_Request_Signed_By_VMI_And_Verify
93    [Template]  Get Certificate Signed By VMI
94
95    # username           password             force_create  valid_csr   valid_status_code    read_timeout
96    ${OPENBMC_USERNAME}  ${OPENBMC_PASSWORD}  ${True}       ${False}    ${HTTP_BAD_REQUEST}  60
97
98    # Send CSR request from operator user.
99    # operator_user        TestPwd123           ${False}      ${False}    ${HTTP_FORBIDDEN}
100
101    # Send CSR request from ReadOnly user.
102    readonly_user        TestPwd123           ${False}      ${False}    ${HTTP_FORBIDDEN}
103
104    # Send CSR request from NoAccess user.
105    # noaccess_user        TestPwd123           ${False}      ${False}    ${HTTP_FORBIDDEN}
106
107
108Get Root Certificate When VMI Is Off And Verify
109    [Documentation]  Get root certificate when vmi is off and verify.
110    [Tags]  Get_Root_Certificate_When_VMI_Is_Off_And_Verify
111    [Setup]  Redfish Power Off
112    [Teardown]  Run keywords  Redfish Power On  stack_mode=skip  AND  FFDC On Test Case Fail
113    [Template]  Get Root Certificate
114
115    # username           password             force_create  valid_csr  valid_status_code
116    ${OPENBMC_USERNAME}  ${OPENBMC_PASSWORD}  ${True}       ${True}    ${HTTP_OK}
117
118    # Request root certificate from operator user.
119    # operator_user        TestPwd123           ${False}      ${True}    ${HTTP_FORBIDDEN}
120
121    # Request root certificate from ReadOnly user.
122    readonly_user        TestPwd123           ${False}      ${True}    ${HTTP_FORBIDDEN}
123
124    # Request root certificate from NoAccess user.
125    # noaccess_user        TestPwd123           ${False}      ${True}    ${HTTP_FORBIDDEN}
126
127
128Get Root Certificate After BMC Reboot And Verify
129    [Documentation]  Get root certificate after bmc reboot and verify.
130    [Tags]  Get_Root_Certificate_After_BMC_Reboot_And_Verify
131    [Setup]  Run Keywords  OBMC Reboot (off)  stack_mode=skip  AND  Redfish Power On
132    [Template]  Get Root Certificate
133
134    # username            password             force_create  valid_csr  valid_status_code
135    ${OPENBMC_USERNAME}   ${OPENBMC_PASSWORD}  ${True}       ${True}    ${HTTP_OK}
136
137    # Request root certificate from operator user.
138    # operator_user         TestPwd123           ${False}      ${True}    ${HTTP_FORBIDDEN}
139
140    # Request root certificate from ReadOnly user.
141    readonly_user         TestPwd123           ${False}      ${True}    ${HTTP_FORBIDDEN}
142
143    # Request root certificate from NoAccess user.
144    # noaccess_user         TestPwd123           ${False}      ${True}    ${HTTP_FORBIDDEN}
145
146
147Get Concurrent Root Certificate Requests From Multiple Admin Users
148    [Documentation]  Get multiple concurrent root certificate requests from multiple admins
149    ...  and verify no errors.
150    [Tags]  Get_Concurrent_Root_Certificate_Requests_From_Multiple_Admin_Users
151
152    FOR  ${i}  IN RANGE  ${5}
153        ${dict}=  Execute Process Multi Keyword  ${5}
154        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
155        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
156        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
157        Dictionary Should Not Contain Value  ${dict}  False
158        ...  msg=One or more operations has failed.
159    END
160
161
162Get Concurrent CSR Requests From Multiple Admin Users
163    [Documentation]  Get multiple concurrent csr requests from multiple admins and verify no errors.
164    [Tags]  Get_Concurrent_CSR_Requests_From_Multiple_Admin_Users
165
166    FOR  ${i}  IN RANGE  ${5}
167        ${dict}=  Execute Process Multi Keyword  ${5}
168        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
169        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
170        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
171        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
172        Dictionary Should Not Contain Value  ${dict}  False
173        ...  msg=One or more operations has failed.
174    END
175
176
177Get Concurrent Corrupted CSR Requests From Multiple Admin Users
178    [Documentation]  Get multiple concurrent corrupted csr requests from multiple admins and verify no errors.
179    [Tags]  Get_Concurrent_Corrupted_CSR_Requests_From_Multiple_Admin_Users
180
181    FOR  ${i}  IN RANGE  ${5}
182        ${dict}=  Execute Process Multi Keyword  ${5}
183        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
184        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
185        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
186        Dictionary Should Not Contain Value  ${dict}  False
187        ...  msg=One or more operations has failed.
188    END
189
190
191*** Comment ***
192
193Get Concurrent Root Certificate Request From Operator Users
194    [Documentation]  Get multiple concurrent root certificate from non admin users and verify no errors.
195    [Tags]  Get_Concurrent_Root_Certificate_Request_From_Operator_Users
196
197    FOR  ${i}  IN RANGE  ${5}
198        ${dict}=  Execute Process Multi Keyword  ${5}
199        ...  Get Root Certificate operator_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
200        ...  Get Root Certificate operator_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
201        ...  Get Root Certificate operator_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
202        Dictionary Should Not Contain Value  ${dict}  False
203        ...  msg=One or more operations has failed.
204    END
205
206
207*** Test Cases ***
208
209Get Concurrent Root Certificate Request From Admin And Non Admin Users
210    [Documentation]  Get multiple concurrent root certificate from admin and non admin users
211    ...  and verify no errors.
212    [Tags]  Get_Concurrent_Root_Certificate_Request_From_Admin_And_Non_Admin_Users
213
214    FOR  ${i}  IN RANGE  ${5}
215        ${dict}=  Execute Process Multi Keyword  ${5}
216        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
217        ...  Get Root Certificate readonly_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
218        Dictionary Should Not Contain Value  ${dict}  False
219        ...  msg=One or more operations has failed.
220    END
221
222
223*** Comment ***
224
225Get Concurrent Root Certificate Request From Different Non Admin Users
226    [Documentation]  Get multiple concurrent root certificate from different non admin users
227    ...  and verify no errors.
228    [Tags]  Get_Concurrent_Root_Certificate_Request_From_Different_Non_Admin_Users
229
230    FOR  ${i}  IN RANGE  ${5}
231        ${dict}=  Execute Process Multi Keyword  ${5}
232        ...  Get Root Certificate operator_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
233        ...  Get Root Certificate readonly_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
234        ...  Get Root Certificate noaccess_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
235        Dictionary Should Not Contain Value  ${dict}  False
236        ...  msg=One or more operations has failed.
237    END
238
239
240Get Concurrent CSR Request From Operator Users
241    [Documentation]  Get multiple concurrent csr request from non admin users and verify no errors.
242    [Tags]  Get_Concurrent_CSR_Request_From_Operator_Users
243
244    FOR  ${i}  IN RANGE  ${5}
245        ${dict}=  Execute Process Multi Keyword  ${5}
246        ...  Get Certificate Signed By VMI operator_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
247        ...  Get Certificate Signed By VMI operator_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
248        ...  Get Certificate Signed By VMI operator_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
249        Dictionary Should Not Contain Value  ${dict}  False
250        ...  msg=One or more operations has failed.
251    END
252
253
254*** Test Cases ***
255
256Get Root Certificate And Send CSR Request Concurrently And Verify
257    [Documentation]  Get root certificate and send csr request concurrently and
258    ...  verify gets root and signed certificate.
259    [Tags]  Get_Root_Certificate_And_Send_CSR_Request_Concurrently_And_Verify
260
261    FOR  ${i}  IN RANGE  ${5}
262        ${dict}=  Execute Process Multi Keyword  ${5}
263        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
264        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
265        Dictionary Should Not Contain Value  ${dict}  False
266        ...  msg=One or more operations has failed.
267    END
268
269
270Get Concurrent Root Certificate And Send CSR Request And Verify
271    [Documentation]  Get concurrent root certificate and send csr request
272    ...  and verify gets root certificate and signed certificate.
273    [Tags]  Get_Concurrent_Root_Certificate_And_Send_CSR_Request_And_Verify
274
275    FOR  ${i}  IN RANGE  ${5}
276        ${dict}=  Execute Process Multi Keyword  ${5}
277        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
278        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
279        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
280        Dictionary Should Not Contain Value  ${dict}  False
281        ...  msg=One or more operations has failed.
282    END
283
284
285Get Root Certificate And Send Multiple CSR Requests Concurrently And Verify
286    [Documentation]  Get root certificate and send multiple csr requests concurrently and
287    ...  verify gets root certificate and signed certificates.
288    [Tags]  Get_Root_Certificate_And_Send_Multiple_CSR_Requests_Concurrently_And_Verify
289
290    FOR  ${i}  IN RANGE  ${5}
291        ${dict}=  Execute Process Multi Keyword  ${5}
292        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
293        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
294        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
295        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
296        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
297        Dictionary Should Not Contain Value  ${dict}  False
298        ...  msg=One or more operations has failed.
299    END
300
301
302Get Root Certificate And Send Multiple Corrupted CSR Requests Concurrently And Verify
303    [Documentation]  Get root certificate and send multiple corrupted csr requests concurrently and
304    ...  verify gets root certificate and error for corrupted csr requests.
305    [Tags]  Get_Root_Certificate_And_Send_Multiple_Corrupted_CSR_Requests_Concurrently_And_Verify
306
307    FOR  ${i}  IN RANGE  ${5}
308        ${dict}=  Execute Process Multi Keyword  ${5}
309        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
310        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
311        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
312        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
313        Dictionary Should Not Contain Value  ${dict}  False
314        ...  msg=One or more operations has failed.
315    END
316
317
318Send Concurrent CSR Request And Corrupted CSR Request And Verify
319    [Documentation]  Send concurrent csr request and corrupted csr request
320    ...  and verify gets certificate for valid csr and error for corrupted csr.
321    [Tags]  Send_Concurrent_CSR_Request_And_Corrupted_CSR_Request_And_Verify
322
323    FOR  ${i}  IN RANGE  ${5}
324        ${dict}=  Execute Process Multi Keyword  ${5}
325        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
326        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
327        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
328        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
329        Dictionary Should Not Contain Value  ${dict}  False
330        ...  msg=One or more operations has failed.
331    END
332
333
334Get Root Certificate Send CSR And Corrupted CSR Request Concurrently And Verify
335    [Documentation]  Get root certificate send csr and corrupted csr requests concurrently and
336    ...  verify gets root certificate and certificate for valid csr and error for corrupted csr.
337    [Tags]  Get_Root_Certificate_Send_CSR_And_Corrupted_CSR_Request_Concurrently_And_Verify
338
339    FOR  ${i}  IN RANGE  ${5}
340        ${dict}=  Execute Process Multi Keyword  ${5}
341        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
342        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
343        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
344        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
345        Dictionary Should Not Contain Value  ${dict}  False
346        ...  msg=One or more operations has failed.
347    END
348
349
350Send Concurrent CSR Request From Admin And Non Admin Users And Verify
351    [Documentation]  Send concurrent csr requests from admin and non-admin users and verify
352    ...  admin gets certificate and non-admin gets error.
353    [Tags]  Send_Concurrent_CSR_Request_From_Admin_And_Non_Admin_Users_And_Verify
354
355    FOR  ${i}  IN RANGE  ${5}
356        ${dict}=  Execute Process Multi Keyword  ${5}
357        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
358        ...  Get Certificate Signed By VMI readonly_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
359        Dictionary Should Not Contain Value  ${dict}  False
360        ...  msg=One or more operations has failed.
361    END
362
363
364*** Comment ***
365
366Send Concurrent CSR Request From Non Admin Users And Verify
367    [Documentation]  Send concurrent csr request from non admin users
368    ...  and verify gets error.
369    [Tags]  Send_Concurrent_CSR_Request_From_Non_Admin_Users_And_Verify
370
371    FOR  ${i}  IN RANGE  ${5}
372        ${dict}=  Execute Process Multi Keyword  ${5}
373        ...  Get Certificate Signed By VMI operator_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
374        ...  Get Certificate Signed By VMI readonly_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
375        ...  Get Certificate Signed By VMI noaccess_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
376        Dictionary Should Not Contain Value  ${dict}  False
377        ...  msg=One or more operations has failed.
378    END
379
380
381Get Root Certificate And Send Corrupted CSR From Admin CSR Request From Operator Concurrently
382    [Documentation]  Get root certificate and send corrupted csr request from admin and
383    ...  csr from operator concurrently and verify gets root certificate and errors for corrupted
384    ...  and for operator.
385    [Tags]  Get_Root_Certificate_And_Send_Corrupted_CSR_From_Admin_CSR_Request_From_Operator_Concurrently
386
387    FOR  ${i}  IN RANGE  ${5}
388        ${dict}=  Execute Process Multi Keyword  ${5}
389        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
390        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
391        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
392        ...  Get Certificate Signed By VMI operator_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
393        Dictionary Should Not Contain Value  ${dict}  False
394        ...  msg=One or more operations has failed.
395    END
396
397
398Get Root Certificate From Operator And Send Corrupted CSR Request And CSR Request From Admin Concurrently
399    [Documentation]  Get root certificate from operator and send corrupted csr request
400    ...  and csr from admin and verify errors for operator and corrupted csr and signed certificate
401    ...  for valid csr.
402    [Tags]  Get_Root_Certificate_From_Operator_And_Send_Corrupted_CSR_Request_And_CSR_Request_From_Admin_Concurrently
403
404    FOR  ${i}  IN RANGE  ${5}
405        ${dict}=  Execute Process Multi Keyword  ${5}
406        ...  Get Root Certificate operator_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
407        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
408        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
409        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
410        Dictionary Should Not Contain Value  ${dict}  False
411        ...  msg=One or more operations has failed.
412    END
413
414
415Get Root Certificate From Operator And Admin Send CSR Request From Admin Concurrently
416    [Documentation]  Get root certificate from operator and admin and
417    ...  and send csr request from admin concurrently and verify error for operator
418    ...  and admin gets root and signed certificate.
419    [Tags]  Get_Root_Certificate_From_Operator_And_Admin_Send_CSR_Request_From_Admin_Concurrently
420
421    FOR  ${i}  IN RANGE  ${5}
422        ${dict}=  Execute Process Multi Keyword  ${5}
423        ...  Get Root Certificate operator_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
424        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
425        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
426        Dictionary Should Not Contain Value  ${dict}  False
427        ...  msg=One or more operations has failed.
428    END
429
430
431Send CSR Request From Admin And Operator And Corrupted CSR From Admin Concurrently And Verify
432    [Documentation]  Send csr request from admin and operator and corrupted
433    ...  csr request from admin and verify gets signed certificate for valid csr for admin
434    ...  gets error for operator and error for corrupted csr.
435    [Tags]  Send_CSR_Request_From_Admin_And_Operator_And_Corrupted_CSR_From_Admin_Concurrently_And_Verify
436
437    FOR  ${i}  IN RANGE  ${5}
438        ${dict}=  Execute Process Multi Keyword  ${5}
439        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
440        ...  Get Certificate Signed By VMI operator_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
441        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
442        Dictionary Should Not Contain Value  ${dict}  False
443        ...  msg=One or more operations has failed.
444    END
445
446
447Send Corrupted CSR Requests From Admin And Operator And CSR Request From Admin Concurrently And Verify
448    [Documentation]  Send corrupted csr request from admin and operator and csr request
449    ...  from admin concurrently and verify errors for corrupted csr and gets signed certificate
450    ...  for valid csr from admin.
451    [Tags]  Send_Corrupted_CSR_Requests_From_Admin_And_Operator_And_CSR_Request_From_Admin_Concurrently_And_Verify
452
453    FOR  ${i}  IN RANGE  ${5}
454        ${dict}=  Execute Process Multi Keyword  ${5}
455        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
456        ...  Get Certificate Signed By VMI operator_user TestPwd123 ${True} ${False} ${HTTP_FORBIDDEN}
457        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
458        Dictionary Should Not Contain Value  ${dict}  False
459        ...  msg=One or more operations has failed.
460    END
461
462
463Send Corrupted CSR Requests From Admin And Operator User Concurrently And Verify
464    [Documentation]  Send corrupted csr requests from admin and operator and
465    ...  verify gets error.
466    [Tags]  Send_Corrupted_CSR_Requests_From_Admin_And_Operator_User_Concurrently_And_Verify
467
468    FOR  ${i}  IN RANGE  ${5}
469        ${dict}=  Execute Process Multi Keyword  ${5}
470        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
471        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
472        ...  Get Certificate Signed By VMI operator_user TestPwd123 ${True} ${False} ${HTTP_FORBIDDEN}
473        Dictionary Should Not Contain Value  ${dict}  False
474        ...  msg=One or more operations has failed.
475    END
476
477
478*** Test Cases ***
479
480Get Root Certificate From Admin And Send CSR Requests From Non Admin Concurrently And Verify
481    [Documentation]  Get root certificate from admin and csr requests from
482    ...  non admin users concurrently and verify gets root certificate for admin and
483    ...  errors for non-admins.
484    [Tags]  Get_Root_Certificate_From_Admin_And_Send_CSR_Requests_From_Non_Admin_Concurrently_And_Verify
485
486    FOR  ${i}  IN RANGE  ${5}
487        ${dict}=  Execute Process Multi Keyword  ${5}
488        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
489        ...  Get Certificate Signed By VMI readonly_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
490        Dictionary Should Not Contain Value  ${dict}  False
491        ...  msg=One or more operations has failed.
492    END
493
494
495Get Root Certificate And Send CSR Requests From Non Admin Users Concurrently And Verify
496    [Documentation]  Get root certificate and send csr requests from non admin
497    ...  users and verify gets errors.
498    [Tags]  Get_Root_Certificate_And_Send_CSR_Requests_From_Non_Admin_Users_Concurrently_And_Verify
499
500    FOR  ${i}  IN RANGE  ${5}
501        ${dict}=  Execute Process Multi Keyword  ${5}
502        ...  Get Root Certificate readonly_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
503        ...  Get Certificate Signed By VMI readonly_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
504        Dictionary Should Not Contain Value  ${dict}  False
505        ...  msg=One or more operations has failed.
506    END
507
508
509Send Corrupted CSR Request From Admin And CSR Requests From Non Admin Concurrently And Verify
510    [Documentation]  Send corrupted csr request from admin and csr request from non admin
511    ...  users concurrently and verify gets errors.
512    [Tags]  Send_Corrupted_CSR_Request_From_Admin_And_CSR_Requests_From_Non_Admin_Concurrently_And_Verify
513
514    FOR  ${i}  IN RANGE  ${5}
515        ${dict}=  Execute Process Multi Keyword  ${5}
516        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
517        ...  Get Certificate Signed By VMI readonly_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
518        Dictionary Should Not Contain Value  ${dict}  False
519        ...  msg=One or more operations has failed.
520    END
521
522
523Send CSR Request And Corrupted CSR Requests From Non Admin Users Concurrently And Verify
524    [Documentation]  Send csr and corrupted csr request from non admin users
525    ...  and verify gets errors.
526    [Tags]  Send_CSR_Request_And_Corrupted_CSR_Requests_From_Non_Admin_Users_Concurrently_And_Verify
527
528    FOR  ${i}  IN RANGE  ${5}
529        ${dict}=  Execute Process Multi Keyword  ${5}
530        ...  Get Certificate Signed By VMI readonly_user TestPwd123 ${True} ${False} ${HTTP_FORBIDDEN}
531        ...  Get Certificate Signed By VMI readonly_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
532        Dictionary Should Not Contain Value  ${dict}  False
533        ...  msg=One or more operations has failed.
534    END
535
536
537*** Comment ***
538
539Get Root Certificate And Send CSR Requests From Admin And Operator Concurrently And Verify
540    [Documentation]  Get root certificate from admin and send csr requests
541    ...  from admin and operator concurrently and verify gets root certificate
542    ...  and signed certificate and gets error for operator.
543    [Tags]  Get_Root_Certificate_And_Send_CSR_Requests_From_Admin_And_Operator_Concurrently_And_Verify
544
545    FOR  ${i}  IN RANGE  ${5}
546        ${dict}=  Execute Process Multi Keyword  ${5}
547        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
548        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
549        ...  Get Certificate Signed By VMI operator_user TestPwd123 ${True} ${True} ${HTTP_FORBIDDEN}
550        Dictionary Should Not Contain Value  ${dict}  False
551        ...  msg=One or more operations has failed.
552    END
553
554
555Get Root Certificate And Send Corrupted CSR Requests From Admin And Operator Concurrently And Verify
556    [Documentation]  Get root certificate from admin and send corrupted csr requests
557    ...  from admin and operator concurrently and verify gets root certificate and errors
558    ...  for corrupted csr.
559    [Tags]  Get_Root_Certificate_And_Send_Corrupted_CSR_Requests_From_Admin_And_Operator_Concurrently_And_Verify
560
561    FOR  ${i}  IN RANGE  ${5}
562        ${dict}=  Execute Process Multi Keyword  ${5}
563        ...  Get Root Certificate ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_OK}
564        ...  Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${False} ${HTTP_BAD_REQUEST}
565        ...  Get Certificate Signed By VMI operator_user TestPwd123 ${True} ${False} ${HTTP_FORBIDDEN}
566        Dictionary Should Not Contain Value  ${dict}  False
567        ...  msg=One or more operations has failed.
568    END
569
570
571*** Keywords ***
572
573Generate CSR String
574    [Documentation]  Generate a csr string.
575
576    # Note: Generates and returns csr string.
577    ${csr_gen_time} =  Get Current Date Time
578    ${CSR_FILE}=  Catenate  SEPARATOR=_  ${csr_gen_time}  csr_server.csr
579    ${CSR_KEY}=   Catenate  SEPARATOR=_  ${csr_gen_time}  csr_server.key
580    Set Test Variable  ${CSR_FILE}
581    Set Test Variable  ${CSR_KEY}
582    ${ssl_cmd}=  Set Variable  openssl req -new -newkey rsa:2048 -nodes -keyout ${CSR_KEY} -out ${CSR_FILE}
583    ${ssl_sub}=  Set Variable
584    ...  -subj "/C=XY/ST=Abcd/L=Efgh/O=ABC/OU=Systems/CN=abc.com/emailAddress=xyz@xx.ABC.com"
585
586    # Run openssl command to create a new private key and use that to generate a CSR string
587    # in server.csr file.
588    ${output}=  Run  ${ssl_cmd} ${ssl_sub}
589    ${csr}=  OperatingSystem.Get File  ${CSR_FILE}
590
591    [Return]  ${csr}
592
593
594Send CSR To VMI And Get Signed
595    [Documentation]  Upload CSR to VMI and get signed.
596    [Arguments]  ${csr}  ${force_create}  ${username}  ${password}  ${read_timeout}
597
598    # Description of argument(s):
599    # csr                    Certificate request from client to VMI.
600    # force_create           Create a new REST session if True.
601    # username               Username to create a REST session.
602    # password               Password to create a REST session.
603
604    Run Keyword If  "${XAUTH_TOKEN}" != "${EMPTY}" or ${force_create} == ${True}
605    ...  Initialize OpenBMC  rest_username=${username}  rest_password=${password}
606
607    ${data}=  Create Dictionary
608    ${headers}=  Create Dictionary  X-Auth-Token=${XAUTH_TOKEN}
609    ...  Content-Type=application/json
610
611    ${cert_uri}=  Set Variable  ${VMI_BASE_URI}Host/Actions/SignCSR
612
613    # For SignCSR request, we need to pass CSR string generated by openssl command.
614    ${csr_data}=  Create Dictionary  CsrString  ${csr}
615
616    ${resp}=  POST On Session  openbmc  ${cert_uri}  json=${csr_data}  headers=${headers}
617    ...  timeout=${read_timeout}  expected_status=any
618    Log to console  ${resp.content}
619
620    [Return]  ${resp}
621
622
623Get Root Certificate
624    [Documentation]  Get root certificate from VMI.
625    [Arguments]  ${username}=${OPENBMC_USERNAME}  ${password}=${OPENBMC_PASSWORD}
626    ...  ${force_create}=${False}  ${valid_csr}=${True}  ${valid_status_code}=${HTTP_OK}
627
628    # Description of argument(s):
629    # cert_type          Type of the certificate requesting. eg. root or SignCSR.
630    # username           Username to create a REST session.
631    # password           Password to create a REST session.
632    # force_create       Create a new REST session if True.
633    # valid_csr          Uses valid CSR string in the REST request if True.
634    #                    This is not applicable for root certificate.
635    # valid_status_code  Expected status code from REST request.
636
637    Run Keyword If  "${XAUTH_TOKEN}" != "${EMPTY}" or ${force_create} == ${True}
638    ...  Initialize OpenBMC  rest_username=${username}  rest_password=${password}
639
640    ${data}=  Create Dictionary
641    ${headers}=  Create Dictionary  X-Auth-Token=${XAUTH_TOKEN}
642    ...  Content-Type=application/json
643
644    ${cert_uri}=  Set Variable  ${VMI_BASE_URI}Host/Certificate/root
645
646    ${resp}=  GET On Session  openbmc  ${cert_uri}  &{data}  headers=${headers}
647    ...  expected_status=any
648
649    Should Be Equal As Strings  ${resp.status_code}  ${valid_status_code}
650    Return From Keyword If  ${resp.status_code} != ${HTTP_OK}
651
652    ${cert}=  Evaluate  json.loads('''${resp.text}''', strict=False)  json
653    Should Contain  ${cert["Certificate"]}  BEGIN CERTIFICATE
654    Should Contain  ${cert["Certificate"]}  END CERTIFICATE
655
656
657Get Subject
658    [Documentation]  Generate a csr string.
659    [Arguments]  ${file_name}  ${is_csr_file}
660
661    # Description of argument(s):
662    # file_name          Name of CSR or signed CERT file.
663    # is_csr_file        A True value means a CSR while a False is for signed CERT file.
664
665    ${subject}=  Run Keyword If  ${is_csr_file}
666    ...     Run  openssl req -in ${file_name} -text -noout | grep Subject:
667    ...   ELSE
668    ...     Run  openssl x509 -in ${file_name} -text -noout | grep Subject:
669
670    [Return]  ${subject}
671
672
673Get Public Key
674    [Documentation]  Generate a csr string.
675    [Arguments]  ${file_name}  ${is_csr_file}
676
677    # Description of argument(s):
678    # file_name          Name of CSR or CERT file.
679    # is_csr_file        A True value means a CSR while a False is for signed CERT file.
680
681    ${PublicKey}=  Run Keyword If  ${is_csr_file}  Run  openssl req -in ${file_name} -noout -pubkey
682    ...   ELSE  Run  openssl x509 -in ${file_name} -noout -pubkey
683
684    [Return]  ${PublicKey}
685
686
687Get Certificate Signed By VMI
688    [Documentation]  Get signed certificate from VMI.
689    [Arguments]  ${username}=${OPENBMC_USERNAME}  ${password}=${OPENBMC_PASSWORD}
690    ...  ${force_create}=${False}  ${valid_csr}=${True}  ${valid_status_code}=${HTTP_OK}
691    ...  ${read_timeout}=20
692
693    # Description of argument(s):
694    # cert_type          Type of the certificate requesting. eg. root or SignCSR.
695    # username           Username to create a REST session.
696    # password           Password to create a REST session.
697    # force_create       Create a new REST session if True.
698    # valid_csr          Uses valid CSR string in the REST request if True.
699    #                    This is not applicable for root certificate.
700    # valid_status_code  Expected status code from REST request.
701
702    Set Test Variable  ${CSR}  CSR
703    Set Test Variable  ${CORRUPTED_CSR}  CORRUPTED_CSR
704
705    ${CSR}=  Generate CSR String
706    ${csr_left}  ${csr_right}=  Split String From Right  ${CSR}  ==  1
707    ${CORRUPTED_CSR}=  Catenate  SEPARATOR=  ${csr_left}  \N  ${csr_right}
708
709    # For SignCSR request, we need to pass CSR string generated by openssl command
710    ${csr_str}=  Set Variable If  ${valid_csr} == ${True}  ${CSR}  ${CORRUPTED_CSR}
711
712    ${resp}=  Send CSR To VMI And Get Signed  ${csr_str}  ${force_create}  ${username}  ${password}
713    ...  ${read_timeout}
714
715    Should Be Equal As Strings  ${resp.status_code}  ${valid_status_code}
716    Return From Keyword If  ${resp.status_code} != ${HTTP_OK}
717
718    ${cert}=  Evaluate  json.loads('''${resp.text}''', strict=False)  json
719    Should Contain  ${cert["Certificate"]}  BEGIN CERTIFICATE
720    Should Contain  ${cert["Certificate"]}  END CERTIFICATE
721
722    # Now do subject and public key verification
723    ${subject_csr}=  Get Subject  ${CSR_FILE}  True
724    ${pubKey_csr}=  Get Public Key  ${CSR_FILE}  True
725
726    # create a crt file with certificate string
727    ${signed_cert}=  Set Variable  ${cert["Certificate"]}
728    ${testcert_gen_time} =  Get Current Date Time
729    ${test_cert_file}=   Catenate  SEPARATOR=_  ${testcert_gen_time}  test_certificate.cert
730
731    Create File  ${test_cert_file}  ${signed_cert}
732    ${subject_signed_csr}=  Get Subject   ${test_cert_file}  False
733    ${pubKey_signed_csr}=  Get Public Key  ${test_cert_file}  False
734
735    Should be equal as strings    ${subject_signed_csr}    ${subject_csr}
736    Should be equal as strings    ${pubKey_signed_csr}     ${pubKey_csr}
737
738
739Suite Setup Execution
740    [Documentation]  Suite setup execution.
741
742    Remove Files  *.csr  *.key  *.cert
743    # Create different user accounts.
744    Redfish.Login
745
746    Redfish Power Off
747    Set BIOS Attribute  pvm_hmc_managed  Enabled
748
749    Redfish Power On
750    Create Users With Different Roles  users=${USERS}  force=${True}
751
752
753Suite Teardown Execution
754    [Documentation]  Suite teardown execution.
755
756    Remove Files  *.csr  *.key  *.cert
757    Delete BMC Users Via Redfish  users=${USERS}
758    Delete All Sessions
759    Redfish.Logout
760