Added tls test-cases in bridge_mode nat_mode and vlan_mode (#391)

* Added tls test-cases in bridge_mode nat_mode and vlan_mode

* added new encryption support

Signed-off-by: shivam <shivam.thakur@candelatech.com>

* Added more ttls test cases to sanity

Signed-off-by: shivam <shivam.thakur@candelatech.com>

Co-authored-by: shivam <shivam.thakur@candelatech.com>
Co-authored-by: Shivam Thakur <70829776+shivamcandela@users.noreply.github.com>
This commit is contained in:
ᴀᴍʀɪᴛ ʀᴀᴊ
2022-03-05 14:15:47 +05:30
committed by GitHub
parent 546b60cd8a
commit 8d891a93bd
9 changed files with 852 additions and 925 deletions

View File

@@ -259,11 +259,15 @@ class RunTest:
self.eap_connect.pairwise = pairwise
self.eap_connect.group = group
if eap == "TLS":
self.eap_connect.key_mgmt = "WPA-EAP-SUITE-B"
self.eap_connect.key_mgmt = key_mgmt
self.eap_connect.station_profile.set_command_flag("add_sta", "80211u_enable", 0)
self.eap_connect.pairwise = "TKIP"
self.eap_connect.group = "TKIP"
self.eap_connect.eap = "EAP-TLS"
self.eap_connect.eap = eap
self.eap_connect.identity = "user"
self.eap_connect.ttls_passwd = "password"
self.eap_connect.private_key = "/home/lanforge/client.p12"
self.eap_connect.ca_cert = "/home/lanforge/ca.pem"
self.eap_connect.pk_passwd = "whatever"
self.eap_connect.ieee80211w = 1
# self.eap_connect.hs20_enable = False
self.eap_connect.ssid = ssid

View File

@@ -1,426 +1,342 @@
# import allure
# import pytest
#
# # pytestmark = [pytest.mark.client_connectivity, pytest.mark.bridge, pytest.mark.enterprise, pytest.mark.tls, pytest.mark.sanity,
# pytest.mark.usefixtures("setup_test_run")]
#
# setup_params_enterprise = {
# "mode": "BRIDGE",
# "ssid_modes": {
# "wpa_enterprise": [
# {"ssid_name": "ssid_wpa_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa_eap_5g", "appliedRadios": ["5G"]}],
# "wpa2_enterprise": [
# {"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
# "wpa3_enterprise": [
# {"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"]}]},
#
# "rf": {},
# "radius": True
# }
#
#
# @pytest.mark.enterprise
# @pytest.mark.parametrize(
# 'setup_profiles',
# [setup_params_enterprise],
# indirect=True,
# scope="class"
# )
# @pytest.mark.usefixtures("setup_profiles")
# class TestBridgeModeEnterpriseTLSSuiteOne(object):
#
# @pytest.mark.wpa_enterprise
# @pytest.mark.twog
# def test_wpa_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
# ssid_name = profile_data["ssid_name"]
# security = "wpa"
# extra_secu = ["wpa2"]
# mode = "BRIDGE"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_twog, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa_enterprise
# @pytest.mark.fiveg
# def test_wpa_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
# ssid_name = profile_data["ssid_name"]
# security = "wpa"
# extra_secu = ["wpa2"]
# mode = "BRIDGE"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_fiveg, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa2_enterprise
# @pytest.mark.twog
# def test_wpa2_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
# ssid_name = profile_data["ssid_name"]
# security = "wpa2"
# mode = "BRIDGE"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_twog, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa2_enterprise
# @pytest.mark.fiveg
# def test_wpa2_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
# ssid_name = profile_data["ssid_name"]
# security = "wpa2"
# mode = "BRIDGE"
# band = "fiveg"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_fiveg, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa3_enterprise
# @pytest.mark.twog
# def test_wpa3_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
# ssid_name = profile_data["ssid_name"]
# security = "wpa3"
# mode = "BRIDGE"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_twog, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa3_enterprise
# @pytest.mark.fiveg
# def test_wpa3_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
# ssid_name = profile_data["ssid_name"]
# security = "wpa3"
# mode = "BRIDGE"
# band = "fiveg"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_fiveg, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
# passes))
# assert passes
#
import pytest
import allure
pytestmark = [pytest.mark.client_connectivity, pytest.mark.bridge, pytest.mark.enterprise,
pytest.mark.tls, pytest.mark.uc_sanity]
setup_params_enterprise = {
"mode": "BRIDGE",
"ssid_modes": {
"wpa_enterprise": [
{"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
{"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
"wpa2_enterprise": [
{"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
{"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
"wpa3_enterprise": [
{"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"]},
{"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"]}]
},
"rf": {},
"radius": True
}
@pytest.mark.parametrize(
'setup_profiles',
[setup_params_enterprise],
indirect=True,
scope="class"
)
@pytest.mark.usefixtures("setup_profiles")
class TestBridgeModeEnterpriseTLSSuiteA(object):
""" SuiteA Enterprise Test Cases
pytest -m "client_connectivity and bridge and enterprise and tls"
"""
@pytest.mark.wpa_enterprise
@pytest.mark.twog
def test_tls_wpa_enterprise_2g(self, station_names_twog, lf_test,
radius_info, exit_on_fail, lf_tools):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
ssid_name = profile_data["ssid_name"]
security = "wpa"
extra_secu = ["wpa2"]
mode = "BRIDGE"
band = "twog"
vlan = 1
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
@pytest.mark.wpa_enterprise
@pytest.mark.fiveg
def test_tls_wpa_enterprise_5g(self, station_names_twog, lf_test,
radius_info, exit_on_fail, lf_tools):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
ssid_name = profile_data["ssid_name"]
security = "wpa"
extra_secu = ["wpa2"]
mode = "BRIDGE"
band = "fiveg"
vlan = 100
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
@pytest.mark.wpa2_enterprise
@pytest.mark.twog
def test_tls_wpa2_enterprise_2g(self, station_names_twog, lf_test,
radius_info, exit_on_fail, lf_tools):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
ssid_name = profile_data["ssid_name"]
security = "wpa2"
mode = "BRIDGE"
band = "twog"
vlan = 100
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP"
identity = radius_info['user']
# pk_passwd = radius_info['pk_password']
# lf_tools.add_vlan(vlan)
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
@pytest.mark.wpa2_enterprise
@pytest.mark.fiveg
def test_tls_wpa2_enterprise_5g(self, station_names_twog, lf_test,
radius_info, exit_on_fail, lf_tools):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
ssid_name = profile_data["ssid_name"]
security = "wpa2"
mode = "BRIDGE"
band = "fiveg"
vlan = 100
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP"
identity = radius_info['user']
# pk_passwd = radius_info['pk_password']
# lf_tools.add_vlan(vlan)
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
@pytest.mark.wpa3_enterprise
@pytest.mark.twog
@pytest.mark.shivam
def test_tls_wpa3_enterprise_2g(self, station_names_twog, lf_test,
radius_info, exit_on_fail, lf_tools):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
ssid_name = profile_data["ssid_name"]
security = "wpa3"
mode = "BRIDGE"
band = "twog"
vlan = 100
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP-SHA256"
identity = radius_info['user']
# pk_passwd = radius_info['pk_password']
# lf_tools.add_vlan(vlan)
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
@pytest.mark.wpa3_enterprise
@pytest.mark.fiveg
def test_tls_wpa3_enterprise_5g(self, station_names_twog, lf_test,
radius_info, exit_on_fail, lf_tools):
""" wpa enterprise 5g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
ssid_name = profile_data["ssid_name"]
security = "wpa3"
mode = "BRIDGE"
band = "fiveg"
vlan = 100
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP-SHA256"
identity = radius_info['user']
# pk_passwd = radius_info['pk_password']
# lf_tools.add_vlan(vlan)
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
#
# setup_params_enterprise_two = {
# "mode": "BRIDGE",
# "ssid_modes": {
# "wpa_enterprise": [
# {"ssid_name": "ssid_wpa_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa_eap_5g", "appliedRadios": ["5G"]}],
# "wpa2_enterprise": [
# {"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
# "wpa3_enterprise": [
# {"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"]}]},
#
# "wpa_wpa2_enterprise_mixed": [
# {"ssid_name": "ssid_wpa_wpa2_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa_wpa2_eap_5g", "appliedRadios": ["5G"]}],
# "wpa3_enterprise_mixed": [
# {"ssid_name": "ssid_wpa3_mixed_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa3_mixed_eap_5g", "appliedRadios": ["5G"]}]
# },
# "rf": {},
# "radius": True
# }
#
#
# @pytest.mark.enterprise
# @allure.suite(suite_name="sanity")
# @allure.sub_suite(sub_suite_name="Bridge Mode EAP Client Connectivity : Suite-B")
# @pytest.mark.suiteB
# @pytest.mark.parametrize(
# 'setup_profiles',
# [setup_params_enterprise],
# [setup_params_enterprise_two],
# indirect=True,
# scope="class"
# )
# @pytest.mark.usefixtures("setup_profiles")
# class TestBridgeModeEnterpriseTLSSuiteTwo(object):
# class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
# """ SuiteA Enterprise Test Cases
# pytest -m "client_connectivity and bridge and enterprise and ttls and suiteB"
# """
#
# @pytest.mark.wpa_enterprise
# @pytest.mark.wpa_wpa2_enterprise_mixed
# @pytest.mark.twog
# def test_wpa_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
# def test_wpa_wpa2_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
# station_names_twog, setup_profiles, lf_test, update_report,
# test_cases, radius_info, exit_on_fail):
# """ wpa enterprise 2g
# pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and twog"
# """
# profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][0]
# ssid_name = profile_data["ssid_name"]
# security = "wpa"
# extra_secu = ["wpa2"]
# mode = "BRIDGE"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# tls_passwd = radius_info["password"]
# eap = "TLS"
# identity = radius_info['user']
# if ssid_name not in get_vif_state:
# allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
# pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# eap=eap, ttls_passwd=tls_passwd, identity=identity,
# station_name=station_names_twog, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa_enterprise
# @pytest.mark.wpa_wpa2_enterprise_mixed
# @pytest.mark.fiveg
# def test_wpa_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
# def test_wpa_wpa2_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
# station_names_fiveg, setup_profiles, lf_test,
# update_report, test_cases, radius_info, exit_on_fail):
# """ wpa enterprise 2g
# pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and fiveg"
# """
# profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][1]
# ssid_name = profile_data["ssid_name"]
# security = "wpa"
# extra_secu = ["wpa2"]
# mode = "BRIDGE"
# band = "twog"
# band = "fiveg"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# tls_passwd = radius_info["password"]
# eap = "TLS"
# identity = radius_info['user']
# if ssid_name not in get_vif_state:
# allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
# pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# eap=eap, ttls_passwd=tls_passwd, identity=identity,
# station_name=station_names_fiveg, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa2_enterprise
# @pytest.mark.wpa3_enterprise_mixed
# @pytest.mark.twog
# def test_wpa2_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
# ssid_name = profile_data["ssid_name"]
# security = "wpa2"
# mode = "BRIDGE"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_twog, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa2_enterprise
# @pytest.mark.fiveg
# def test_wpa2_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
# ssid_name = profile_data["ssid_name"]
# security = "wpa2"
# mode = "BRIDGE"
# band = "fiveg"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_fiveg, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa3_enterprise
# @pytest.mark.twog
# def test_wpa3_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
# def test_wpa3_enterprise_mixed_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
# station_names_twog, setup_profiles, lf_test,
# update_report, test_cases, radius_info, exit_on_fail):
# """ wpa enterprise 2g
# pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise_mixed and twog"
# """
# profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][0]
# ssid_name = profile_data["ssid_name"]
# security = "wpa3"
# mode = "BRIDGE"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# tls_passwd = radius_info["password"]
# eap = "TLS"
# identity = radius_info['user']
# if ssid_name not in get_vif_state:
# allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
# pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# eap=eap, ttls_passwd=tls_passwd, identity=identity,
# station_name=station_names_twog, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa3_enterprise
# @pytest.mark.wpa3_enterprise_mixed
# @pytest.mark.fiveg
# def test_wpa3_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
# def test_wpa3_enterprise_mixed_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
# station_names_fiveg, setup_profiles, lf_test,
# update_report, exit_on_fail,
# test_cases, radius_info):
# """ wpa enterprise 2g
# pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise_mixed and fiveg"
# """
# profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][1]
# ssid_name = profile_data["ssid_name"]
# security = "wpa3"
# mode = "BRIDGE"
# band = "fiveg"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# tls_passwd = radius_info["password"]
# eap = "TLS"
# identity = radius_info['user']
# if ssid_name not in get_vif_state:
# allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
# pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# eap=eap, ttls_passwd=tls_passwd, identity=identity,
# station_name=station_names_fiveg, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
# passes))
# assert passes

View File

@@ -8,7 +8,7 @@ import allure
import pytest
pytestmark = [pytest.mark.client_connectivity, pytest.mark.bridge, pytest.mark.enterprise, pytest.mark.ttls,
pytest.mark.ucentral, pytest.mark.sanity] # , pytest.mark.usefixtures("setup_test_run")]
pytest.mark.ucentral, pytest.mark.sanity, pytest.mark.uc_sanity]
setup_params_enterprise = {
"mode": "BRIDGE",
@@ -37,7 +37,6 @@ setup_params_enterprise = {
indirect=True,
scope="class"
)
@pytest.mark.uc_sanity
@pytest.mark.usefixtures("setup_profiles")
class TestBridgeModeEnterpriseTTLSSuiteA(object):
""" SuiteA Enterprise Test Cases
@@ -46,8 +45,8 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
@pytest.mark.wpa_enterprise
@pytest.mark.twog
def test_wpa_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_twog, setup_profiles, lf_test, update_report,
def test_wpa_enterprise_2g(self, get_ap_logs, get_lf_logs,
station_names_twog, lf_test, update_report,
test_cases, radius_info, exit_on_fail):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_enterprise and twog"
@@ -62,8 +61,6 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -98,8 +95,8 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
@pytest.mark.sanity_light
@pytest.mark.wpa2_enterprise
@pytest.mark.twog
def test_wpa2_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_twog, setup_profiles, lf_test, update_report,
def test_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
station_names_twog, lf_test, update_report,
test_cases, radius_info, exit_on_fail):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa2_enterprise and twog"
@@ -113,10 +110,6 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
get_vif_state.append(ssid_name)
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -126,8 +119,8 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
@pytest.mark.sanity_light
@pytest.mark.wpa2_enterprise
@pytest.mark.fiveg
def test_wpa2_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_fiveg, setup_profiles, lf_test, update_report,
def test_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
station_names_fiveg, lf_test, update_report,
test_cases, radius_info, exit_on_fail):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa2_enterprise and fiveg"
@@ -141,10 +134,6 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
get_vif_state.append(ssid_name)
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -154,7 +143,7 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
@pytest.mark.wpa3_enterprise
@pytest.mark.twog
def test_wpa3_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
def test_wpa3_enterprise_2g(self, get_ap_logs, get_lf_logs,
station_names_twog, setup_profiles, lf_test, update_report,
test_cases, radius_info, exit_on_fail):
""" wpa enterprise 2g
@@ -169,9 +158,6 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -181,7 +167,7 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
@pytest.mark.wpa3_enterprise
@pytest.mark.fiveg
def test_wpa3_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
def test_wpa3_enterprise_5g(self, get_ap_logs, get_lf_logs,
station_names_fiveg, setup_profiles, lf_test, update_report,
test_cases, radius_info, exit_on_fail):
""" wpa enterprise 2g
@@ -196,9 +182,6 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -239,8 +222,8 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
@pytest.mark.wpa_wpa2_enterprise_mixed
@pytest.mark.twog
def test_wpa_wpa2_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_twog, setup_profiles, lf_test, update_report,
def test_wpa_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
station_names_twog, lf_test, update_report,
test_cases, radius_info, exit_on_fail):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and twog"
@@ -255,9 +238,6 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -267,8 +247,8 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
@pytest.mark.wpa_wpa2_enterprise_mixed
@pytest.mark.fiveg
def test_wpa_wpa2_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_fiveg, setup_profiles, lf_test,
def test_wpa_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
station_names_fiveg, lf_test,
update_report, test_cases, radius_info, exit_on_fail):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and fiveg"
@@ -283,9 +263,6 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -295,8 +272,8 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
@pytest.mark.wpa3_enterprise_mixed
@pytest.mark.twog
def test_wpa3_enterprise_mixed_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_twog, setup_profiles, lf_test,
def test_wpa3_enterprise_mixed_2g(self, get_ap_logs, get_lf_logs,
station_names_twog, lf_test,
update_report, test_cases, radius_info, exit_on_fail):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise_mixed and twog"
@@ -310,9 +287,6 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -322,8 +296,8 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
@pytest.mark.wpa3_enterprise_mixed
@pytest.mark.fiveg
def test_wpa3_enterprise_mixed_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_fiveg, setup_profiles, lf_test,
def test_wpa3_enterprise_mixed_5g(self, get_ap_logs, get_lf_logs,
station_names_fiveg, lf_test,
update_report, exit_on_fail,
test_cases, radius_info):
""" wpa enterprise 2g
@@ -338,9 +312,6 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,

View File

@@ -1,218 +1,228 @@
# import allure
# import pytest
#
# # pytestmark = [pytest.mark.client_connectivity, pytest.mark.nat, pytest.mark.enterprise, pytest.mark.tls, pytest.mark.sanity, pytest.mark.usefixtures("setup_test_run")]
#
# setup_params_enterprise = {
# "mode": "NAT",
# "ssid_modes": {
# "wpa_enterprise": [
# {"ssid_name": "ssid_wpa_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa_eap_5g", "appliedRadios": ["5G"]}],
# "wpa2_enterprise": [
# {"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
# "wpa3_enterprise": [
# {"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"]}]},
#
# "rf": {},
# "radius": True
# }
#
#
# @pytest.mark.enterprise
# @pytest.mark.parametrize(
# 'setup_profiles',
# [setup_params_enterprise],
# indirect=True,
# scope="class"
# )
# @pytest.mark.usefixtures("setup_profiles")
# class TestNATModeEnterpriseTLSSuiteOne(object):
#
# @pytest.mark.wpa_enterprise
# @pytest.mark.twog
# def test_wpa_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
# ssid_name = profile_data["ssid_name"]
# security = "wpa"
# extra_secu = ["wpa2"]
# mode = "NAT"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_twog, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa_enterprise
# @pytest.mark.fiveg
# def test_wpa_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
# ssid_name = profile_data["ssid_name"]
# security = "wpa"
# extra_secu = ["wpa2"]
# mode = "NAT"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_fiveg, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa2_enterprise
# @pytest.mark.twog
# def test_wpa2_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
# ssid_name = profile_data["ssid_name"]
# security = "wpa2"
# mode = "NAT"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_twog, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa2_enterprise
# @pytest.mark.fiveg
# def test_wpa2_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
# ssid_name = profile_data["ssid_name"]
# security = "wpa2"
# mode = "NAT"
# band = "fiveg"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_fiveg, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa3_enterprise
# @pytest.mark.twog
# def test_wpa3_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
# ssid_name = profile_data["ssid_name"]
# security = "wpa3"
# mode = "NAT"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_twog, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa3_enterprise
# @pytest.mark.fiveg
# def test_wpa3_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
# ssid_name = profile_data["ssid_name"]
# security = "wpa3"
# mode = "NAT"
# band = "fiveg"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_fiveg, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
# passes))
# assert passes
#
import allure
import pytest
pytestmark = [pytest.mark.client_connectivity, pytest.mark.nat, pytest.mark.enterprise, pytest.mark.tls,
pytest.mark.uc_sanity]
setup_params_enterprise = {
"mode": "NAT",
"ssid_modes": {
"wpa_enterprise": [
{"ssid_name": "ssid_wpa_eap_2g", "appliedRadios": ["2G"]},
{"ssid_name": "ssid_wpa_eap_5g", "appliedRadios": ["5G"]}],
"wpa2_enterprise": [
{"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
{"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
"wpa3_enterprise": [
{"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"]},
{"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"]}]},
"rf": {},
"radius": True
}
@pytest.mark.enterprise
@pytest.mark.parametrize(
'setup_profiles',
[setup_params_enterprise],
indirect=True,
scope="class"
)
@pytest.mark.usefixtures("setup_profiles")
class TestNATModeEnterpriseTLSSuiteOne(object):
@pytest.mark.wpa_enterprise
@pytest.mark.twog
def test_tls_wpa_enterprise_2g(self, station_names_twog, lf_test,
radius_info, exit_on_fail, lf_tools):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
ssid_name = profile_data["ssid_name"]
security = "wpa"
extra_secu = ["wpa2"]
mode = "NAT"
band = "twog"
vlan = 1
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
@pytest.mark.wpa_enterprise
@pytest.mark.fiveg
def test_tls_wpa_enterprise_5g(self, station_names_twog, lf_test, update_report, test_cases,
radius_info, exit_on_fail, lf_tools):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
ssid_name = profile_data["ssid_name"]
security = "wpa"
extra_secu = ["wpa2"]
mode = "NAT"
band = "fiveg"
vlan = 1
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
# passes))
assert passes
@pytest.mark.wpa2_enterprise
@pytest.mark.twog
def test_tls_wpa2_enterprise_2g(self, station_names_twog, lf_test,
radius_info, exit_on_fail, lf_tools):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
ssid_name = profile_data["ssid_name"]
security = "wpa2"
mode = "NAT"
band = "twog"
vlan = 1
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
@pytest.mark.wpa2_enterprise
@pytest.mark.fiveg
def test_tls_wpa2_enterprise_5g(self, station_names_twog, lf_test, update_report, test_cases,
radius_info, exit_on_fail, lf_tools):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
ssid_name = profile_data["ssid_name"]
security = "wpa2"
mode = "NAT"
band = "fiveg"
vlan = 1
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
# passes))
assert passes
@pytest.mark.wpa3_enterprise
@pytest.mark.twog
def test_tls_wpa3_enterprise_2g(self, station_names_twog, lf_test,
radius_info, exit_on_fail, lf_tools):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
ssid_name = profile_data["ssid_name"]
security = "wpa3"
mode = "NAT"
band = "twog"
vlan = 1
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP-SHA256"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
@pytest.mark.wpa3_enterprise
@pytest.mark.fiveg
def test_tls_wpa3_enterprise_5g(self, station_names_twog, lf_test, update_report, test_cases,
radius_info, exit_on_fail, lf_tools):
""" wpa3 enterprise 5g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
ssid_name = profile_data["ssid_name"]
security = "wpa3"
mode = "NAT"
band = "fiveg"
vlan = 1
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP-SHA256"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
#
# setup_params_enterprise_two = {
# "mode": "NAT",

View File

@@ -2,7 +2,7 @@ import allure
import pytest
pytestmark = [pytest.mark.client_connectivity, pytest.mark.nat, pytest.mark.enterprise, pytest.mark.ttls,
pytest.mark.ucentral, pytest.mark.sanity] #pytest.mark.usefixtures("setup_test_run"),
pytest.mark.ucentral, pytest.mark.sanity, pytest.mark.uc_sanity]
setup_params_enterprise = {
"mode": "NAT",
@@ -28,7 +28,6 @@ setup_params_enterprise = {
indirect=True,
scope="class"
)
@pytest.mark.uc_sanity
@pytest.mark.usefixtures("setup_profiles")
class TestNATModeEnterpriseTTLSSuiteOne(object):

View File

@@ -1,218 +1,222 @@
# import allure
# import pytest
#
# # pytestmark = [pytest.mark.client_connectivity, pytest.mark.usefixtures("setup_test_run"), pytest.mark.vlan, pytest.mark.enterprise, pytest.mark.tls, pytest.mark.sanity]
#
# setup_params_enterprise = {
# "mode": "VLAN",
# "ssid_modes": {
# "wpa_enterprise": [
# {"ssid_name": "ssid_wpa_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa_eap_5g", "appliedRadios": ["5G"]}],
# "wpa2_enterprise": [
# {"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
# "wpa3_enterprise": [
# {"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"]},
# {"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"]}]},
#
# "rf": {},
# "radius": True
# }
#
#
# @pytest.mark.enterprise
# @pytest.mark.parametrize(
# 'setup_profiles',
# [setup_params_enterprise],
# indirect=True,
# scope="class"
# )
# @pytest.mark.usefixtures("setup_profiles")
# class TestVLANModeEnterpriseTLSSuiteOne(object):
#
# @pytest.mark.wpa_enterprise
# @pytest.mark.twog
# def test_wpa_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
# ssid_name = profile_data["ssid_name"]
# security = "wpa"
# extra_secu = ["wpa2"]
# mode = "VLAN"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_twog, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - VLAN mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - VLAN mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa_enterprise
# @pytest.mark.fiveg
# def test_wpa_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
# ssid_name = profile_data["ssid_name"]
# security = "wpa"
# extra_secu = ["wpa2"]
# mode = "VLAN"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_fiveg, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - VLAN mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - VLAN mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa2_enterprise
# @pytest.mark.twog
# def test_wpa2_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
# ssid_name = profile_data["ssid_name"]
# security = "wpa2"
# mode = "VLAN"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_twog, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - VLAN mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - VLAN mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa2_enterprise
# @pytest.mark.fiveg
# def test_wpa2_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
# ssid_name = profile_data["ssid_name"]
# security = "wpa2"
# mode = "VLAN"
# band = "fiveg"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_fiveg, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - VLAN mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - VLAN mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa3_enterprise
# @pytest.mark.twog
# def test_wpa3_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
# ssid_name = profile_data["ssid_name"]
# security = "wpa3"
# mode = "VLAN"
# band = "twog"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_twog, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - VLAN mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - VLAN mode' + str(
# passes))
# assert passes
#
# @pytest.mark.wpa3_enterprise
# @pytest.mark.fiveg
# def test_wpa3_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
# test_cases, radius_info):
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
# ssid_name = profile_data["ssid_name"]
# security = "wpa3"
# mode = "VLAN"
# band = "fiveg"
# vlan = 1
# ttls_passwd = radius_info["password"]
# eap = "TTLS"
# identity = radius_info['user']
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
# mode=mode, band=band,
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
# station_name=station_names_fiveg, vlan_id=vlan)
#
# if passes:
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
# status_id=1,
# msg='2G WPA Client Connectivity Passed successfully - VLAN mode' + str(
# passes))
# else:
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
# status_id=5,
# msg='2G WPA Client Connectivity Failed - VLAN mode' + str(
# passes))
# assert passes
#
import allure
import pytest
pytestmark = [pytest.mark.client_connectivity,
pytest.mark.vlan, pytest.mark.enterprise, pytest.mark.tls, pytest.mark.uc_sanity]
setup_params_enterprise = {
"mode": "VLAN",
"ssid_modes": {
"wpa_enterprise": [
{"ssid_name": "ssid_wpa_eap_2g", "appliedRadios": ["2G"], "vlan": 100},
{"ssid_name": "ssid_wpa_eap_5g", "appliedRadios": ["5G"], "vlan": 100}],
"wpa2_enterprise": [
{"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"], "vlan": 100},
{"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"], "vlan": 100}],
"wpa3_enterprise": [
{"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"], "vlan": 100},
{"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"], "vlan": 100}]},
"rf": {},
"radius": True
}
@pytest.mark.parametrize(
'setup_profiles',
[setup_params_enterprise],
indirect=True,
scope="class"
)
@pytest.mark.uc_sanity
@pytest.mark.usefixtures("setup_profiles")
class TestVLANModeEnterpriseTLSSuiteOne(object):
@pytest.mark.wpa_enterprise
@pytest.mark.twog
def test_tls_vlan_wpa_enterprise_2g(self, get_vif_state, station_names_twog, setup_profiles, lf_test,
test_cases, radius_info, exit_on_fail):
""" wpa enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
ssid_name = profile_data["ssid_name"]
security = "wpa"
extra_secu = ["wpa2"]
mode = "VLAN"
band = "twog"
vlan = 100
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
@pytest.mark.wpa_enterprise
@pytest.mark.fiveg
def test_tls_vlan_wpa_enterprise_5g(self, get_vif_state, station_names_fiveg, setup_profiles, lf_test,
test_cases, radius_info, exit_on_fail):
""" wpa enterprise 5g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
ssid_name = profile_data["ssid_name"]
security = "wpa"
extra_secu = ["wpa2"]
mode = "VLAN"
band = "fiveg"
vlan = 100
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_fiveg,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
@pytest.mark.wpa2_enterprise
@pytest.mark.twog
def test_tls_vlan_wpa2_enterprise_2g(self, get_vif_state, station_names_twog, setup_profiles, lf_test,
test_cases, radius_info, exit_on_fail):
""" wpa2 enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
ssid_name = profile_data["ssid_name"]
security = "wpa2"
mode = "VLAN"
band = "twog"
vlan = 100
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
@pytest.mark.wpa2_enterprise
@pytest.mark.fiveg
def test_tls_vlan_wpa2_enterprise_5g(self, get_vif_state, station_names_fiveg, setup_profiles, lf_test,
test_cases, radius_info, exit_on_fail):
""" wpa2 enterprise 5g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
ssid_name = profile_data["ssid_name"]
security = "wpa2"
mode = "VLAN"
band = "fiveg"
vlan = 100
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_fiveg,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
@pytest.mark.wpa3_enterprise
@pytest.mark.twog
def test_tls_vlan_wpa3_enterprise_2g(self, get_vif_state, station_names_twog, setup_profiles, lf_test,
test_cases, radius_info, exit_on_fail):
""" wpa2 enterprise 2g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
ssid_name = profile_data["ssid_name"]
security = "wpa3"
mode = "VLAN"
band = "twog"
vlan = 100
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP-SHA256"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_twog,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
@pytest.mark.wpa3_enterprise
@pytest.mark.fiveg
def test_tls_vlan_wpa3_enterprise_5g(self, get_vif_state, station_names_fiveg, setup_profiles, lf_test,
test_cases, radius_info, exit_on_fail):
""" wpa3 enterprise 5g
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
"""
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
ssid_name = profile_data["ssid_name"]
security = "wpa3"
mode = "VLAN"
band = "fiveg"
vlan = 100
tls_passwd = radius_info["password"]
eap = "TLS"
key_mgmt = "WPA-EAP-SHA256"
identity = radius_info['user']
# pk_passwd = radcius_info['pk_password']
# lf_tools.add_vlan(vlan)
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
identity=identity, station_name=station_names_fiveg,
key_mgmt=key_mgmt, vlan_id=vlan)
assert passes
#
# setup_params_enterprise_two = {
# "mode": "VLAN",

View File

@@ -34,8 +34,8 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
@pytest.mark.wpa_enterprise
@pytest.mark.twog
def test_wpa_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_twog, setup_profiles, lf_test,
def test_wpa_enterprise_2g(self, get_ap_logs, get_lf_logs,
station_names_twog, lf_test,
update_report,
test_cases, radius_info, exit_on_fail):
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
@@ -48,9 +48,6 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -60,8 +57,8 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
@pytest.mark.wpa_enterprise
@pytest.mark.fiveg
def test_wpa_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_fiveg, setup_profiles, lf_test,
def test_wpa_enterprise_5g(self, get_ap_logs, get_lf_logs,
station_names_fiveg, lf_test,
update_report,
test_cases, radius_info, exit_on_fail):
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
@@ -74,9 +71,6 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -87,8 +81,8 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
@pytest.mark.sanity_light
@pytest.mark.wpa2_enterprise
@pytest.mark.twog
def test_wpa2_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_twog, setup_profiles, lf_test,
def test_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
station_names_twog, lf_test,
update_report,
test_cases, radius_info, exit_on_fail):
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
@@ -100,10 +94,6 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
get_vif_state.append(ssid_name)
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -114,8 +104,8 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
@pytest.mark.sanity_light
@pytest.mark.wpa2_enterprise
@pytest.mark.fiveg
def test_wpa2_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_fiveg, setup_profiles, lf_test,
def test_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
station_names_fiveg, lf_test,
update_report,
test_cases, radius_info, exit_on_fail):
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
@@ -127,10 +117,6 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
get_vif_state.append(ssid_name)
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -140,8 +126,8 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
@pytest.mark.wpa3_enterprise
@pytest.mark.twog
def test_wpa3_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_twog, setup_profiles, lf_test,
def test_wpa3_enterprise_2g(self, get_ap_logs, get_lf_logs,
station_names_twog, lf_test,
update_report,
test_cases, radius_info, exit_on_fail):
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
@@ -153,9 +139,6 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -165,8 +148,8 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
@pytest.mark.wpa3_enterprise
@pytest.mark.fiveg
def test_wpa3_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_fiveg, setup_profiles, lf_test,
def test_wpa3_enterprise_5g(self, get_ap_logs, get_lf_logs,
station_names_fiveg, lf_test,
update_report,
test_cases, radius_info, exit_on_fail):
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
@@ -178,9 +161,6 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -216,8 +196,9 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
@pytest.mark.wpa_wpa2_enterprise_mixed
@pytest.mark.twog
def test_wpa_wpa2_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_twog, setup_profiles, lf_test,
@pytest.mark.shivamt
def test_wpa_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
station_names_twog, lf_test,
update_report,
test_cases, radius_info, exit_on_fail):
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][0]
@@ -230,9 +211,6 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -242,8 +220,8 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
@pytest.mark.wpa_wpa2_enterprise_mixed
@pytest.mark.fiveg
def test_wpa_wpa2_enterprise_5g(self, get_vif_state, get_ap_logs,
station_names_fiveg, setup_profiles,
def test_wpa_wpa2_enterprise_5g(self, get_ap_logs,
station_names_fiveg,
lf_test, get_lf_logs,
update_report, test_cases, radius_info, exit_on_fail):
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][1]
@@ -256,9 +234,6 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -268,8 +243,8 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
@pytest.mark.wpa3_enterprise_mixed
@pytest.mark.twog
def test_wpa3_enterprise_mixed_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_twog, setup_profiles,
def test_wpa3_enterprise_mixed_2g(self, get_ap_logs, get_lf_logs,
station_names_twog,
lf_test,
update_report, test_cases, radius_info, exit_on_fail):
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][0]
@@ -281,9 +256,6 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
@@ -293,8 +265,8 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
@pytest.mark.wpa3_enterprise_mixed
@pytest.mark.fiveg
def test_wpa3_enterprise_mixed_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
station_names_fiveg, setup_profiles,
def test_wpa3_enterprise_mixed_5g(self, get_ap_logs, get_lf_logs,
station_names_fiveg,
lf_test,
update_report, exit_on_fail,
test_cases, radius_info):
@@ -307,9 +279,6 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
ttls_passwd = radius_info["password"]
eap = "TTLS"
identity = radius_info['user']
if ssid_name not in get_vif_state:
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
mode=mode, band=band,
eap=eap, ttls_passwd=ttls_passwd, identity=identity,

View File

@@ -509,10 +509,8 @@ class Fixtures_2x:
if mode == "wpa2_enterprise":
for j in profile_data["ssid"][mode]:
if "radius_auth_data" in j:
print("yes")
var = True
else:
print("no")
var = False
for j in profile_data["ssid"][mode]:
if mode in get_markers.keys() and get_markers[mode]:
@@ -579,7 +577,63 @@ class Fixtures_2x:
except Exception as e:
print(e)
test_cases["wpa_eap"] = False
if mode == "wpa_wpa2_enterprise_mixed": # -------WPA WPA2 Enterprise Mixed----------------
for j in profile_data["ssid"][mode]:
if mode in get_markers.keys() and get_markers[mode]:
try:
if j["appliedRadios"].__contains__("2G"):
lf_dut_data.append(j)
if j["appliedRadios"].__contains__("5G"):
lf_dut_data.append(j)
j["appliedRadios"] = list(set(j["appliedRadios"]))
j['security'] = "wpa-mixed"
RADIUS_SERVER_DATA = radius_info
RADIUS_ACCOUNTING_DATA = radius_accounting_info
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j, radius=True,
radius_auth_data=RADIUS_SERVER_DATA,
radius_accounting_data=RADIUS_ACCOUNTING_DATA)
test_cases["wpa_eap"] = True
except Exception as e:
print(e)
test_cases["wpa_eap"] = False
if mode == "wpa3_enterprise_mixed": # -------WPA3 Enterprise Mixed----------------
for j in profile_data["ssid"][mode]:
if mode in get_markers.keys() and get_markers[mode]:
try:
if j["appliedRadios"].__contains__("2G"):
lf_dut_data.append(j)
if j["appliedRadios"].__contains__("5G"):
lf_dut_data.append(j)
j["appliedRadios"] = list(set(j["appliedRadios"]))
j['security'] = "wpa3-mixed"
RADIUS_SERVER_DATA = radius_info
RADIUS_ACCOUNTING_DATA = radius_accounting_info
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j, radius=True,
radius_auth_data=RADIUS_SERVER_DATA,
radius_accounting_data=RADIUS_ACCOUNTING_DATA)
test_cases["wpa_eap"] = True
except Exception as e:
print(e)
test_cases["wpa_eap"] = False
if mode == "wpa3_192_enterprise": # -------WPA3 192 Enterprise Mixed----------------
for j in profile_data["ssid"][mode]:
if mode in get_markers.keys() and get_markers[mode]:
try:
if j["appliedRadios"].__contains__("2G"):
lf_dut_data.append(j)
if j["appliedRadios"].__contains__("5G"):
lf_dut_data.append(j)
j["appliedRadios"] = list(set(j["appliedRadios"]))
j['security'] = "wpa3-192"
RADIUS_SERVER_DATA = radius_info
RADIUS_ACCOUNTING_DATA = radius_accounting_info
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j, radius=True,
radius_auth_data=RADIUS_SERVER_DATA,
radius_accounting_data=RADIUS_ACCOUNTING_DATA)
test_cases["wpa_eap"] = True
except Exception as e:
print(e)
test_cases["wpa_eap"] = False
try:
if parameter['express-wifi']:
instantiate_profile_obj.set_express_wifi(open_flow=open_flow)

View File

@@ -3,7 +3,7 @@
"CONFIGURATION" : {
"basic-01": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -38,10 +38,10 @@
"AX-Station-Name": "ax"
}
}
},
},
"basic-02": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -76,10 +76,10 @@
"AX-Station-Name": "ax"
}
}
},
},
"basic-03": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -114,10 +114,10 @@
"AX-Station-Name": "ax"
}
}
},
},
"basic-03a": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -155,7 +155,7 @@
},
"basic-04": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -190,10 +190,10 @@
"AX-Station-Name": "ax"
}
}
},
},
"basic-05": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -228,10 +228,10 @@
"AX-Station-Name": "ax"
}
}
},
},
"basic-06": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -266,10 +266,10 @@
"AX-Station-Name": "ax"
}
}
},
},
"basic-07": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -304,10 +304,10 @@
"AX-Station-Name": "ax"
}
}
},
},
"basic-08": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -342,11 +342,11 @@
"AX-Station-Name": "ax"
}
}
},
},
"advanced-01": {
"controller": {
"url":"https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url":"https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -354,12 +354,12 @@
{
"model": "cig_wf194c4",
"mode": "wifi6",
"serial": "f40b9fe78e03",
"serial": "f40b9fe78e03",
"jumphost": true,
"ip": "10.28.3.102",
"ip": "10.28.3.102",
"username": "lanforge",
"password": "pumpkin77",
"port": 22,
"port": 22,
"jumphost_tty": "/dev/ttyAP2",
"version": "release-latest"
}
@@ -385,7 +385,7 @@
},
"advanced-02": {
"controller": {
"url":"https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url":"https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -424,7 +424,7 @@
},
"mesh-01": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -461,7 +461,7 @@
"mode": "wifi6",
"serial": "903cb39d692c",
"jumphost": true,
"ip": "10.28.3.101",
"ip": "10.28.3.101",
"username": "lanforge",
"password": "pumpkin77",
"port": 22,
@@ -509,7 +509,7 @@
},
"mesh-02": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -596,7 +596,7 @@
"interop-01": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -637,7 +637,7 @@
"interop-02": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -678,7 +678,7 @@
"interop-03": {
"controller": {
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
"username": "tip@ucentral.com",
"password": "OpenWifi%123"
},
@@ -719,7 +719,7 @@
"basic-ext-03-03": {
"controller": {
"url": "https://wlan-portal-svc-nola-ext-03.cicd.lab.wlan.tip.build",
"url": "https://wlan-portal-svc-nola-ext-03.cicd.lab.wlan.tip.build",
"username": "support@example.com",
"password": "support",
"version": "1.1.0-SNAPSHOT",
@@ -889,5 +889,5 @@
"open_flow":{}
}