1*** Settings *** 2Documentation Connections and authentication module stability tests. 3 4Resource ../lib/bmc_redfish_resource.robot 5Resource ../lib/bmc_network_utils.robot 6Resource ../lib/openbmc_ffdc.robot 7Resource ../lib/resource.robot 8Resource ../lib/utils.robot 9Resource ../lib/connection_client.robot 10Library ../lib/bmc_network_utils.py 11 12Library SSHLibrary 13Library Collections 14Library XvfbRobot 15Library OperatingSystem 16Library Selenium2Library 120 120 17Library Telnet 30 Seconds 18Library Screenshot 19 20Variables ../gui/data/gui_variables.py 21 22*** Variables *** 23 24${iterations} 10000 25${loop_iteration} ${1000} 26${hostname} test_hostname 27${MAX_UNAUTH_PER_IP} ${5} 28${bmc_url} https://${OPENBMC_HOST} 29 30 31*** Test Cases *** 32 33Test Patch Without Auth Token Fails 34 [Documentation] Send patch method without auth token and verify it throws an error. 35 [Tags] Test_Patch_Without_Auth_Token_Fails 36 37 ${active_channel_config}= Get Active Channel Config 38 ${ethernet_interface}= Set Variable ${active_channel_config['${CHANNEL_NUMBER}']['name']} 39 40 Redfish.Patch ${REDFISH_NW_ETH_IFACE}${ethernet_interface} body={'HostName': '${hostname}'} 41 ... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] 42 43 44Flood Patch Without Auth Token And Check Stability Of BMC 45 [Documentation] Flood patch method without auth token and check BMC stability. 46 [Tags] Flood_Patch_Without_Auth_Token_And_Check_Stability_Of_BMC 47 @{status_list}= Create List 48 49 ${active_channel_config}= Get Active Channel Config 50 ${ethernet_interface}= Set Variable ${active_channel_config['${CHANNEL_NUMBER}']['name']} 51 52 FOR ${i} IN RANGE ${1} ${iterations} 53 Log To Console ${i}th iteration 54 Run Keyword And Ignore Error 55 ... Redfish.Patch ${REDFISH_NW_ETH_IFACE}${ethernet_interface} body={'HostName': '${hostname}'} 56 57 # Every 100th iteration, check BMC allows patch with auth token. 58 ${status}= Run Keyword If ${i} % 100 == 0 Run Keyword And Return Status 59 ... Login And Configure Hostname 60 Run Keyword If ${status} == False Append To List ${status_list} ${status} 61 END 62 ${verify_count}= Evaluate ${iterations}/100 63 ${fail_count}= Get Length ${status_list} 64 65 Should Be Equal ${fail_count} 0 66 ... msg=Patch operation failed ${fail_count} times in ${verify_count} attempts 67 68 69Verify User Cannot Login After 5 Non-Logged In Sessions 70 [Documentation] User should not be able to login when there 71 ... are 5 non-logged in sessions. 72 [Tags] Verify_User_Cannot_Login_After_5_Non-Logged_In_Sessions 73 74 FOR ${i} IN RANGE ${0} ${MAX_UNAUTH_PER_IP} 75 SSHLibrary.Open Connection ${OPENBMC_HOST} 76 Start Process ssh ${OPENBMC_USERNAME}@${OPENBMC_HOST} shell=True 77 END 78 79 SSHLibrary.Open Connection ${OPENBMC_HOST} 80 ${status}= Run Keyword And Return Status SSHLibrary.Login ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} 81 82 Should Be Equal ${status} ${False} 83 84 85Test Post Without Auth Token Fails 86 [Documentation] Send post method without auth token and verify it throws an error. 87 [Tags] Test_Post_Without_Auth_Token_Fails 88 89 ${user_info}= Create Dictionary 90 ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} 91 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} 92 ... valid_status_codes=[${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] 93 94 95Flood Post Without Auth Token And Check Stability Of BMC 96 [Documentation] Flood post method without auth token and check BMC stability. 97 [Tags] Flood_Post_Without_Auth_Token_And_Check_Stability_Of_BMC 98 99 @{status_list}= Create List 100 ${user_info}= Create Dictionary 101 ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} 102 103 FOR ${i} IN RANGE ${1} ${iterations} 104 Log To Console ${i}th iteration 105 Run Keyword And Ignore Error 106 ... Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} 107 108 # Every 100th iteration, check BMC allows post with auth token. 109 ${status}= Run Keyword If ${i} % 100 == 0 Run Keyword And Return Status 110 ... Login And Create User 111 Run Keyword If ${status} == False Append To List ${status_list} ${status} 112 END 113 ${verify_count}= Evaluate ${iterations}/100 114 ${fail_count}= Get Length ${status_list} 115 116 Should Be Equal ${fail_count} 0 117 ... msg=Post operation failed ${fail_count} times in ${verify_count} attempts 118 119 120Make Large Number Of Wrong SSH Login Attempts And Check Stability 121 [Documentation] Check BMC stability with large number of SSH wrong login requests. 122 [Tags] Make_Large_Number_Of_Wrong_SSH_Login_Attempts_And_Check_Stability 123 [Setup] Set Account Lockout Threshold 124 [Teardown] FFDC On Test Case Fail 125 126 SSHLibrary.Open Connection ${OPENBMC_HOST} 127 @{ssh_status_list}= Create List 128 FOR ${i} IN RANGE ${loop_iteration} 129 Log To Console ${i}th iteration 130 ${invalid_password}= Catenate ${OPENBMC_PASSWORD}${i} 131 Run Keyword and Ignore Error 132 ... Open Connection And Log In ${OPENBMC_USERNAME} ${invalid_password} 133 134 # Every 100th iteration Login with correct credentials 135 ${status}= Run keyword If ${i} % ${100} == ${0} Run Keyword And Return Status 136 ... Open Connection And Log In ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} 137 Run Keyword If ${status} == ${False} Append To List ${ssh_status_list} ${status} 138 SSHLibrary.Close Connection 139 END 140 141 ${valid_login_count}= Evaluate ${iterations}/100 142 ${fail_count}= Get Length ${ssh_status_list} 143 Should Be Equal ${fail_count} ${0} 144 ... msg= Login Failed ${fail_count} times in ${valid_login_count} attempts. 145 146 147Test Stability On Large Number Of Wrong Login Attempts To GUI 148 [Documentation] Test stability on large number of wrong login attempts to GUI. 149 [Tags] Test_Stability_On_Large_Number_Of_Wrong_Login_Attempts_To_GUI 150 151 @{status_list}= Create List 152 153 # Open headless browser. 154 Start Virtual Display 155 ${browser_ID}= Open Browser ${bmc_url} alias=browser1 156 Set Window Size 1920 1080 157 158 Go To ${bmc_url} 159 160 FOR ${i} IN RANGE ${1} ${iterations} 161 Log To Console ${i}th login 162 Run Keyword And Ignore Error Login to GUI With Wrong Credentials 163 164 # Every 100th iteration, check BMC GUI is responsive. 165 ${status}= Run Keyword If ${i} % 100 == 0 Run Keyword And Return Status 166 ... Open Browser ${bmc_url} 167 Append To List ${status_list} ${status} 168 Run Keyword If '${status}' == 'True' Run Keywords Close Browser AND Switch Browser browser1 169 END 170 171 ${fail_count}= Count Values In List ${status_list} False 172 Run Keyword If ${fail_count} > ${0} FAIL Could not open BMC GUI ${fail_count} times 173 174 175*** Keywords *** 176 177Login And Configure Hostname 178 [Documentation] Login and configure hostname 179 180 [Teardown] Redfish.Logout 181 182 Redfish.Login 183 184 Redfish.patch ${REDFISH_NW_PROTOCOL_URI} body={'HostName': '${hostname}'} 185 ... valid_status_codes=[${HTTP_OK}, ${HTTP_NO_CONTENT}] 186 187 188Login And Create User 189 [Documentation] Login and create user 190 191 [Teardown] Redfish.Logout 192 193 Redfish.Login 194 195 ${user_info}= Create Dictionary 196 ... UserName=test_user Password=TestPwd123 RoleId=Operator Enabled=${True} 197 Redfish.Post /redfish/v1/AccountService/Accounts/ body=&{user_info} 198 ... valid_status_codes=[${HTTP_OK}] 199 200 201Set Account Lockout Threshold 202 [Documentation] Set user account lockout threshold. 203 204 [Teardown] Redfish.Logout 205 206 Redfish.Login 207 Redfish.Patch /redfish/v1/AccountService body=[('AccountLockoutThreshold', 0)] 208 209 210Login to GUI With Incorrect Credentials 211 [Documentation] Login to GUI With Wrong Credentials. 212 213 Input Text ${xpath_textbox_username} root 214 Input Password ${xpath_textbox_password} incorrect_password 215 Click Button ${xpath_login_button} 216