mirror of
https://github.com/Telecominfraproject/wlan-testing.git
synced 2026-01-27 10:23:37 +00:00
Added tls test-cases in bridge_mode nat_mode and vlan_mode (#391)
* Added tls test-cases in bridge_mode nat_mode and vlan_mode * added new encryption support Signed-off-by: shivam <shivam.thakur@candelatech.com> * Added more ttls test cases to sanity Signed-off-by: shivam <shivam.thakur@candelatech.com> Co-authored-by: shivam <shivam.thakur@candelatech.com> Co-authored-by: Shivam Thakur <70829776+shivamcandela@users.noreply.github.com>
This commit is contained in:
@@ -259,11 +259,15 @@ class RunTest:
|
||||
self.eap_connect.pairwise = pairwise
|
||||
self.eap_connect.group = group
|
||||
if eap == "TLS":
|
||||
self.eap_connect.key_mgmt = "WPA-EAP-SUITE-B"
|
||||
self.eap_connect.key_mgmt = key_mgmt
|
||||
self.eap_connect.station_profile.set_command_flag("add_sta", "80211u_enable", 0)
|
||||
self.eap_connect.pairwise = "TKIP"
|
||||
self.eap_connect.group = "TKIP"
|
||||
self.eap_connect.eap = "EAP-TLS"
|
||||
self.eap_connect.eap = eap
|
||||
self.eap_connect.identity = "user"
|
||||
self.eap_connect.ttls_passwd = "password"
|
||||
self.eap_connect.private_key = "/home/lanforge/client.p12"
|
||||
self.eap_connect.ca_cert = "/home/lanforge/ca.pem"
|
||||
self.eap_connect.pk_passwd = "whatever"
|
||||
self.eap_connect.ieee80211w = 1
|
||||
|
||||
# self.eap_connect.hs20_enable = False
|
||||
self.eap_connect.ssid = ssid
|
||||
|
||||
@@ -1,426 +1,342 @@
|
||||
# import allure
|
||||
# import pytest
|
||||
#
|
||||
# # pytestmark = [pytest.mark.client_connectivity, pytest.mark.bridge, pytest.mark.enterprise, pytest.mark.tls, pytest.mark.sanity,
|
||||
# pytest.mark.usefixtures("setup_test_run")]
|
||||
#
|
||||
# setup_params_enterprise = {
|
||||
# "mode": "BRIDGE",
|
||||
# "ssid_modes": {
|
||||
# "wpa_enterprise": [
|
||||
# {"ssid_name": "ssid_wpa_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa_eap_5g", "appliedRadios": ["5G"]}],
|
||||
# "wpa2_enterprise": [
|
||||
# {"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
|
||||
# "wpa3_enterprise": [
|
||||
# {"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"]}]},
|
||||
#
|
||||
# "rf": {},
|
||||
# "radius": True
|
||||
# }
|
||||
#
|
||||
#
|
||||
# @pytest.mark.enterprise
|
||||
# @pytest.mark.parametrize(
|
||||
# 'setup_profiles',
|
||||
# [setup_params_enterprise],
|
||||
# indirect=True,
|
||||
# scope="class"
|
||||
# )
|
||||
# @pytest.mark.usefixtures("setup_profiles")
|
||||
# class TestBridgeModeEnterpriseTLSSuiteOne(object):
|
||||
#
|
||||
# @pytest.mark.wpa_enterprise
|
||||
# @pytest.mark.twog
|
||||
# def test_wpa_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa"
|
||||
# extra_secu = ["wpa2"]
|
||||
# mode = "BRIDGE"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_twog, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa_enterprise
|
||||
# @pytest.mark.fiveg
|
||||
# def test_wpa_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa"
|
||||
# extra_secu = ["wpa2"]
|
||||
# mode = "BRIDGE"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_fiveg, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa2_enterprise
|
||||
# @pytest.mark.twog
|
||||
# def test_wpa2_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa2"
|
||||
# mode = "BRIDGE"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_twog, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa2_enterprise
|
||||
# @pytest.mark.fiveg
|
||||
# def test_wpa2_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa2"
|
||||
# mode = "BRIDGE"
|
||||
# band = "fiveg"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_fiveg, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa3_enterprise
|
||||
# @pytest.mark.twog
|
||||
# def test_wpa3_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa3"
|
||||
# mode = "BRIDGE"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_twog, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa3_enterprise
|
||||
# @pytest.mark.fiveg
|
||||
# def test_wpa3_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa3"
|
||||
# mode = "BRIDGE"
|
||||
# band = "fiveg"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_fiveg, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
import pytest
|
||||
import allure
|
||||
|
||||
pytestmark = [pytest.mark.client_connectivity, pytest.mark.bridge, pytest.mark.enterprise,
|
||||
pytest.mark.tls, pytest.mark.uc_sanity]
|
||||
setup_params_enterprise = {
|
||||
"mode": "BRIDGE",
|
||||
"ssid_modes": {
|
||||
"wpa_enterprise": [
|
||||
{"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
|
||||
{"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
|
||||
"wpa2_enterprise": [
|
||||
{"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
|
||||
{"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
|
||||
"wpa3_enterprise": [
|
||||
{"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"]},
|
||||
{"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"]}]
|
||||
},
|
||||
|
||||
"rf": {},
|
||||
"radius": True
|
||||
}
|
||||
|
||||
|
||||
@pytest.mark.parametrize(
|
||||
'setup_profiles',
|
||||
[setup_params_enterprise],
|
||||
indirect=True,
|
||||
scope="class"
|
||||
)
|
||||
@pytest.mark.usefixtures("setup_profiles")
|
||||
class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
""" SuiteA Enterprise Test Cases
|
||||
pytest -m "client_connectivity and bridge and enterprise and tls"
|
||||
"""
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_tls_wpa_enterprise_2g(self, station_names_twog, lf_test,
|
||||
radius_info, exit_on_fail, lf_tools):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_wpa_enterprise_5g(self, station_names_twog, lf_test,
|
||||
radius_info, exit_on_fail, lf_tools):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_tls_wpa2_enterprise_2g(self, station_names_twog, lf_test,
|
||||
radius_info, exit_on_fail, lf_tools):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa2"
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_wpa2_enterprise_5g(self, station_names_twog, lf_test,
|
||||
radius_info, exit_on_fail, lf_tools):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa2"
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
@pytest.mark.shivam
|
||||
def test_tls_wpa3_enterprise_2g(self, station_names_twog, lf_test,
|
||||
radius_info, exit_on_fail, lf_tools):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP-SHA256"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_wpa3_enterprise_5g(self, station_names_twog, lf_test,
|
||||
radius_info, exit_on_fail, lf_tools):
|
||||
""" wpa enterprise 5g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP-SHA256"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
#
|
||||
# setup_params_enterprise_two = {
|
||||
# "mode": "BRIDGE",
|
||||
# "ssid_modes": {
|
||||
# "wpa_enterprise": [
|
||||
# {"ssid_name": "ssid_wpa_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa_eap_5g", "appliedRadios": ["5G"]}],
|
||||
# "wpa2_enterprise": [
|
||||
# {"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
|
||||
# "wpa3_enterprise": [
|
||||
# {"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"]}]},
|
||||
#
|
||||
# "wpa_wpa2_enterprise_mixed": [
|
||||
# {"ssid_name": "ssid_wpa_wpa2_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa_wpa2_eap_5g", "appliedRadios": ["5G"]}],
|
||||
# "wpa3_enterprise_mixed": [
|
||||
# {"ssid_name": "ssid_wpa3_mixed_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa3_mixed_eap_5g", "appliedRadios": ["5G"]}]
|
||||
# },
|
||||
# "rf": {},
|
||||
# "radius": True
|
||||
# }
|
||||
#
|
||||
#
|
||||
# @pytest.mark.enterprise
|
||||
# @allure.suite(suite_name="sanity")
|
||||
# @allure.sub_suite(sub_suite_name="Bridge Mode EAP Client Connectivity : Suite-B")
|
||||
# @pytest.mark.suiteB
|
||||
# @pytest.mark.parametrize(
|
||||
# 'setup_profiles',
|
||||
# [setup_params_enterprise],
|
||||
# [setup_params_enterprise_two],
|
||||
# indirect=True,
|
||||
# scope="class"
|
||||
# )
|
||||
# @pytest.mark.usefixtures("setup_profiles")
|
||||
# class TestBridgeModeEnterpriseTLSSuiteTwo(object):
|
||||
# class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
# """ SuiteA Enterprise Test Cases
|
||||
# pytest -m "client_connectivity and bridge and enterprise and ttls and suiteB"
|
||||
# """
|
||||
#
|
||||
# @pytest.mark.wpa_enterprise
|
||||
# @pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
# @pytest.mark.twog
|
||||
# def test_wpa_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
|
||||
# def test_wpa_wpa2_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
# station_names_twog, setup_profiles, lf_test, update_report,
|
||||
# test_cases, radius_info, exit_on_fail):
|
||||
# """ wpa enterprise 2g
|
||||
# pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and twog"
|
||||
# """
|
||||
# profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][0]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa"
|
||||
# extra_secu = ["wpa2"]
|
||||
# mode = "BRIDGE"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# tls_passwd = radius_info["password"]
|
||||
# eap = "TLS"
|
||||
# identity = radius_info['user']
|
||||
# if ssid_name not in get_vif_state:
|
||||
# allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
# pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
# station_name=station_names_twog, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa_enterprise
|
||||
# @pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
# @pytest.mark.fiveg
|
||||
# def test_wpa_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
||||
# def test_wpa_wpa2_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
# station_names_fiveg, setup_profiles, lf_test,
|
||||
# update_report, test_cases, radius_info, exit_on_fail):
|
||||
# """ wpa enterprise 2g
|
||||
# pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and fiveg"
|
||||
# """
|
||||
# profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][1]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa"
|
||||
# extra_secu = ["wpa2"]
|
||||
# mode = "BRIDGE"
|
||||
# band = "twog"
|
||||
# band = "fiveg"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# tls_passwd = radius_info["password"]
|
||||
# eap = "TLS"
|
||||
# identity = radius_info['user']
|
||||
# if ssid_name not in get_vif_state:
|
||||
# allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
# pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
# station_name=station_names_fiveg, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa2_enterprise
|
||||
# @pytest.mark.wpa3_enterprise_mixed
|
||||
# @pytest.mark.twog
|
||||
# def test_wpa2_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa2"
|
||||
# mode = "BRIDGE"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_twog, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa2_enterprise
|
||||
# @pytest.mark.fiveg
|
||||
# def test_wpa2_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa2"
|
||||
# mode = "BRIDGE"
|
||||
# band = "fiveg"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_fiveg, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa3_enterprise
|
||||
# @pytest.mark.twog
|
||||
# def test_wpa3_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
|
||||
# def test_wpa3_enterprise_mixed_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
# station_names_twog, setup_profiles, lf_test,
|
||||
# update_report, test_cases, radius_info, exit_on_fail):
|
||||
# """ wpa enterprise 2g
|
||||
# pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise_mixed and twog"
|
||||
# """
|
||||
# profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][0]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa3"
|
||||
# mode = "BRIDGE"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# tls_passwd = radius_info["password"]
|
||||
# eap = "TLS"
|
||||
# identity = radius_info['user']
|
||||
# if ssid_name not in get_vif_state:
|
||||
# allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
# pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
# station_name=station_names_twog, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa3_enterprise
|
||||
# @pytest.mark.wpa3_enterprise_mixed
|
||||
# @pytest.mark.fiveg
|
||||
# def test_wpa3_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
|
||||
# def test_wpa3_enterprise_mixed_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
# station_names_fiveg, setup_profiles, lf_test,
|
||||
# update_report, exit_on_fail,
|
||||
# test_cases, radius_info):
|
||||
# """ wpa enterprise 2g
|
||||
# pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise_mixed and fiveg"
|
||||
# """
|
||||
# profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][1]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa3"
|
||||
# mode = "BRIDGE"
|
||||
# band = "fiveg"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# tls_passwd = radius_info["password"]
|
||||
# eap = "TLS"
|
||||
# identity = radius_info['user']
|
||||
# if ssid_name not in get_vif_state:
|
||||
# allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
# pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
# station_name=station_names_fiveg, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - bridge mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_bridge"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - bridge mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
|
||||
@@ -8,7 +8,7 @@ import allure
|
||||
import pytest
|
||||
|
||||
pytestmark = [pytest.mark.client_connectivity, pytest.mark.bridge, pytest.mark.enterprise, pytest.mark.ttls,
|
||||
pytest.mark.ucentral, pytest.mark.sanity] # , pytest.mark.usefixtures("setup_test_run")]
|
||||
pytest.mark.ucentral, pytest.mark.sanity, pytest.mark.uc_sanity]
|
||||
|
||||
setup_params_enterprise = {
|
||||
"mode": "BRIDGE",
|
||||
@@ -37,7 +37,6 @@ setup_params_enterprise = {
|
||||
indirect=True,
|
||||
scope="class"
|
||||
)
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.usefixtures("setup_profiles")
|
||||
class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
""" SuiteA Enterprise Test Cases
|
||||
@@ -46,8 +45,8 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_wpa_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
def test_wpa_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_enterprise and twog"
|
||||
@@ -62,8 +61,6 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -98,8 +95,8 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_wpa2_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
def test_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa2_enterprise and twog"
|
||||
@@ -113,10 +110,6 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
get_vif_state.append(ssid_name)
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -126,8 +119,8 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa2_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test, update_report,
|
||||
def test_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa2_enterprise and fiveg"
|
||||
@@ -141,10 +134,6 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
get_vif_state.append(ssid_name)
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -154,7 +143,7 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_wpa3_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
def test_wpa3_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
""" wpa enterprise 2g
|
||||
@@ -169,9 +158,6 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -181,7 +167,7 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa3_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
def test_wpa3_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
""" wpa enterprise 2g
|
||||
@@ -196,9 +182,6 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -239,8 +222,8 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
def test_wpa_wpa2_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
def test_wpa_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and twog"
|
||||
@@ -255,9 +238,6 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -267,8 +247,8 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa_wpa2_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
def test_wpa_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and fiveg"
|
||||
@@ -283,9 +263,6 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -295,8 +272,8 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
def test_wpa3_enterprise_mixed_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test,
|
||||
def test_wpa3_enterprise_mixed_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise_mixed and twog"
|
||||
@@ -310,9 +287,6 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -322,8 +296,8 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa3_enterprise_mixed_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
def test_wpa3_enterprise_mixed_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report, exit_on_fail,
|
||||
test_cases, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
@@ -338,9 +312,6 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
|
||||
@@ -1,218 +1,228 @@
|
||||
# import allure
|
||||
# import pytest
|
||||
#
|
||||
# # pytestmark = [pytest.mark.client_connectivity, pytest.mark.nat, pytest.mark.enterprise, pytest.mark.tls, pytest.mark.sanity, pytest.mark.usefixtures("setup_test_run")]
|
||||
#
|
||||
# setup_params_enterprise = {
|
||||
# "mode": "NAT",
|
||||
# "ssid_modes": {
|
||||
# "wpa_enterprise": [
|
||||
# {"ssid_name": "ssid_wpa_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa_eap_5g", "appliedRadios": ["5G"]}],
|
||||
# "wpa2_enterprise": [
|
||||
# {"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
|
||||
# "wpa3_enterprise": [
|
||||
# {"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"]}]},
|
||||
#
|
||||
# "rf": {},
|
||||
# "radius": True
|
||||
# }
|
||||
#
|
||||
#
|
||||
# @pytest.mark.enterprise
|
||||
# @pytest.mark.parametrize(
|
||||
# 'setup_profiles',
|
||||
# [setup_params_enterprise],
|
||||
# indirect=True,
|
||||
# scope="class"
|
||||
# )
|
||||
# @pytest.mark.usefixtures("setup_profiles")
|
||||
# class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
#
|
||||
# @pytest.mark.wpa_enterprise
|
||||
# @pytest.mark.twog
|
||||
# def test_wpa_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa"
|
||||
# extra_secu = ["wpa2"]
|
||||
# mode = "NAT"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_twog, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa_enterprise
|
||||
# @pytest.mark.fiveg
|
||||
# def test_wpa_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa"
|
||||
# extra_secu = ["wpa2"]
|
||||
# mode = "NAT"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_fiveg, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa2_enterprise
|
||||
# @pytest.mark.twog
|
||||
# def test_wpa2_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa2"
|
||||
# mode = "NAT"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_twog, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa2_enterprise
|
||||
# @pytest.mark.fiveg
|
||||
# def test_wpa2_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa2"
|
||||
# mode = "NAT"
|
||||
# band = "fiveg"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_fiveg, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa3_enterprise
|
||||
# @pytest.mark.twog
|
||||
# def test_wpa3_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa3"
|
||||
# mode = "NAT"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_twog, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa3_enterprise
|
||||
# @pytest.mark.fiveg
|
||||
# def test_wpa3_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa3"
|
||||
# mode = "NAT"
|
||||
# band = "fiveg"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_fiveg, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
import allure
|
||||
import pytest
|
||||
|
||||
pytestmark = [pytest.mark.client_connectivity, pytest.mark.nat, pytest.mark.enterprise, pytest.mark.tls,
|
||||
pytest.mark.uc_sanity]
|
||||
|
||||
setup_params_enterprise = {
|
||||
"mode": "NAT",
|
||||
"ssid_modes": {
|
||||
"wpa_enterprise": [
|
||||
{"ssid_name": "ssid_wpa_eap_2g", "appliedRadios": ["2G"]},
|
||||
{"ssid_name": "ssid_wpa_eap_5g", "appliedRadios": ["5G"]}],
|
||||
"wpa2_enterprise": [
|
||||
{"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
|
||||
{"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
|
||||
"wpa3_enterprise": [
|
||||
{"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"]},
|
||||
{"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"]}]},
|
||||
|
||||
"rf": {},
|
||||
"radius": True
|
||||
}
|
||||
|
||||
|
||||
@pytest.mark.enterprise
|
||||
@pytest.mark.parametrize(
|
||||
'setup_profiles',
|
||||
[setup_params_enterprise],
|
||||
indirect=True,
|
||||
scope="class"
|
||||
)
|
||||
@pytest.mark.usefixtures("setup_profiles")
|
||||
class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_tls_wpa_enterprise_2g(self, station_names_twog, lf_test,
|
||||
radius_info, exit_on_fail, lf_tools):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_wpa_enterprise_5g(self, station_names_twog, lf_test, update_report, test_cases,
|
||||
radius_info, exit_on_fail, lf_tools):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
|
||||
# passes))
|
||||
|
||||
assert passes
|
||||
|
||||
|
||||
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_tls_wpa2_enterprise_2g(self, station_names_twog, lf_test,
|
||||
radius_info, exit_on_fail, lf_tools):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa2"
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_wpa2_enterprise_5g(self, station_names_twog, lf_test, update_report, test_cases,
|
||||
radius_info, exit_on_fail, lf_tools):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa2"
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - NAT mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
|
||||
# passes))
|
||||
|
||||
assert passes
|
||||
|
||||
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_tls_wpa3_enterprise_2g(self, station_names_twog, lf_test,
|
||||
radius_info, exit_on_fail, lf_tools):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP-SHA256"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_wpa3_enterprise_5g(self, station_names_twog, lf_test, update_report, test_cases,
|
||||
radius_info, exit_on_fail, lf_tools):
|
||||
""" wpa3 enterprise 5g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP-SHA256"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
|
||||
#
|
||||
# setup_params_enterprise_two = {
|
||||
# "mode": "NAT",
|
||||
|
||||
@@ -2,7 +2,7 @@ import allure
|
||||
import pytest
|
||||
|
||||
pytestmark = [pytest.mark.client_connectivity, pytest.mark.nat, pytest.mark.enterprise, pytest.mark.ttls,
|
||||
pytest.mark.ucentral, pytest.mark.sanity] #pytest.mark.usefixtures("setup_test_run"),
|
||||
pytest.mark.ucentral, pytest.mark.sanity, pytest.mark.uc_sanity]
|
||||
|
||||
setup_params_enterprise = {
|
||||
"mode": "NAT",
|
||||
@@ -28,7 +28,6 @@ setup_params_enterprise = {
|
||||
indirect=True,
|
||||
scope="class"
|
||||
)
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.usefixtures("setup_profiles")
|
||||
class TestNATModeEnterpriseTTLSSuiteOne(object):
|
||||
|
||||
|
||||
@@ -1,218 +1,222 @@
|
||||
# import allure
|
||||
# import pytest
|
||||
#
|
||||
# # pytestmark = [pytest.mark.client_connectivity, pytest.mark.usefixtures("setup_test_run"), pytest.mark.vlan, pytest.mark.enterprise, pytest.mark.tls, pytest.mark.sanity]
|
||||
#
|
||||
# setup_params_enterprise = {
|
||||
# "mode": "VLAN",
|
||||
# "ssid_modes": {
|
||||
# "wpa_enterprise": [
|
||||
# {"ssid_name": "ssid_wpa_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa_eap_5g", "appliedRadios": ["5G"]}],
|
||||
# "wpa2_enterprise": [
|
||||
# {"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"]}],
|
||||
# "wpa3_enterprise": [
|
||||
# {"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"]},
|
||||
# {"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"]}]},
|
||||
#
|
||||
# "rf": {},
|
||||
# "radius": True
|
||||
# }
|
||||
#
|
||||
#
|
||||
# @pytest.mark.enterprise
|
||||
# @pytest.mark.parametrize(
|
||||
# 'setup_profiles',
|
||||
# [setup_params_enterprise],
|
||||
# indirect=True,
|
||||
# scope="class"
|
||||
# )
|
||||
# @pytest.mark.usefixtures("setup_profiles")
|
||||
# class TestVLANModeEnterpriseTLSSuiteOne(object):
|
||||
#
|
||||
# @pytest.mark.wpa_enterprise
|
||||
# @pytest.mark.twog
|
||||
# def test_wpa_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa"
|
||||
# extra_secu = ["wpa2"]
|
||||
# mode = "VLAN"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_twog, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - VLAN mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - VLAN mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa_enterprise
|
||||
# @pytest.mark.fiveg
|
||||
# def test_wpa_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa"
|
||||
# extra_secu = ["wpa2"]
|
||||
# mode = "VLAN"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_fiveg, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - VLAN mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - VLAN mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa2_enterprise
|
||||
# @pytest.mark.twog
|
||||
# def test_wpa2_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa2"
|
||||
# mode = "VLAN"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_twog, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - VLAN mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - VLAN mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa2_enterprise
|
||||
# @pytest.mark.fiveg
|
||||
# def test_wpa2_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa2"
|
||||
# mode = "VLAN"
|
||||
# band = "fiveg"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_fiveg, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - VLAN mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - VLAN mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa3_enterprise
|
||||
# @pytest.mark.twog
|
||||
# def test_wpa3_enterprise_2g(self, station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa3"
|
||||
# mode = "VLAN"
|
||||
# band = "twog"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_twog, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - VLAN mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - VLAN mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
# @pytest.mark.wpa3_enterprise
|
||||
# @pytest.mark.fiveg
|
||||
# def test_wpa3_enterprise_5g(self, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||
# test_cases, radius_info):
|
||||
# profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
|
||||
# ssid_name = profile_data["ssid_name"]
|
||||
# security = "wpa3"
|
||||
# mode = "VLAN"
|
||||
# band = "fiveg"
|
||||
# vlan = 1
|
||||
# ttls_passwd = radius_info["password"]
|
||||
# eap = "TTLS"
|
||||
# identity = radius_info['user']
|
||||
# passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
# mode=mode, band=band,
|
||||
# eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
# station_name=station_names_fiveg, vlan_id=vlan)
|
||||
#
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
|
||||
# status_id=1,
|
||||
# msg='2G WPA Client Connectivity Passed successfully - VLAN mode' + str(
|
||||
# passes))
|
||||
# else:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_VLAN"],
|
||||
# status_id=5,
|
||||
# msg='2G WPA Client Connectivity Failed - VLAN mode' + str(
|
||||
# passes))
|
||||
# assert passes
|
||||
#
|
||||
import allure
|
||||
import pytest
|
||||
|
||||
pytestmark = [pytest.mark.client_connectivity,
|
||||
pytest.mark.vlan, pytest.mark.enterprise, pytest.mark.tls, pytest.mark.uc_sanity]
|
||||
|
||||
setup_params_enterprise = {
|
||||
"mode": "VLAN",
|
||||
|
||||
"ssid_modes": {
|
||||
"wpa_enterprise": [
|
||||
{"ssid_name": "ssid_wpa_eap_2g", "appliedRadios": ["2G"], "vlan": 100},
|
||||
{"ssid_name": "ssid_wpa_eap_5g", "appliedRadios": ["5G"], "vlan": 100}],
|
||||
"wpa2_enterprise": [
|
||||
{"ssid_name": "ssid_wpa2_eap_2g", "appliedRadios": ["2G"], "vlan": 100},
|
||||
{"ssid_name": "ssid_wpa2_eap_5g", "appliedRadios": ["5G"], "vlan": 100}],
|
||||
"wpa3_enterprise": [
|
||||
{"ssid_name": "ssid_wpa3_eap_2g", "appliedRadios": ["2G"], "vlan": 100},
|
||||
{"ssid_name": "ssid_wpa3_eap_5g", "appliedRadios": ["5G"], "vlan": 100}]},
|
||||
|
||||
"rf": {},
|
||||
"radius": True
|
||||
}
|
||||
|
||||
|
||||
@pytest.mark.parametrize(
|
||||
'setup_profiles',
|
||||
[setup_params_enterprise],
|
||||
indirect=True,
|
||||
scope="class"
|
||||
)
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.usefixtures("setup_profiles")
|
||||
class TestVLANModeEnterpriseTLSSuiteOne(object):
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_tls_vlan_wpa_enterprise_2g(self, get_vif_state, station_names_twog, setup_profiles, lf_test,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_vlan_wpa_enterprise_5g(self, get_vif_state, station_names_fiveg, setup_profiles, lf_test,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
""" wpa enterprise 5g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_fiveg,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_tls_vlan_wpa2_enterprise_2g(self, get_vif_state, station_names_twog, setup_profiles, lf_test,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
""" wpa2 enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa2"
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_vlan_wpa2_enterprise_5g(self, get_vif_state, station_names_fiveg, setup_profiles, lf_test,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
""" wpa2 enterprise 5g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa2"
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_fiveg,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_tls_vlan_wpa3_enterprise_2g(self, get_vif_state, station_names_twog, setup_profiles, lf_test,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
""" wpa2 enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP-SHA256"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_vlan_wpa3_enterprise_5g(self, get_vif_state, station_names_fiveg, setup_profiles, lf_test,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
""" wpa3 enterprise 5g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
key_mgmt = "WPA-EAP-SHA256"
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_fiveg,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
#
|
||||
# setup_params_enterprise_two = {
|
||||
# "mode": "VLAN",
|
||||
|
||||
@@ -34,8 +34,8 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_wpa_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test,
|
||||
def test_wpa_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
|
||||
@@ -48,9 +48,6 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -60,8 +57,8 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
def test_wpa_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
||||
@@ -74,9 +71,6 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -87,8 +81,8 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_wpa2_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test,
|
||||
def test_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
|
||||
@@ -100,10 +94,6 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
get_vif_state.append(ssid_name)
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -114,8 +104,8 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa2_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
def test_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
|
||||
@@ -127,10 +117,6 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
get_vif_state.append(ssid_name)
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -140,8 +126,8 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_wpa3_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test,
|
||||
def test_wpa3_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
|
||||
@@ -153,9 +139,6 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -165,8 +148,8 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa3_enterprise_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
def test_wpa3_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
|
||||
@@ -178,9 +161,6 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -216,8 +196,9 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
def test_wpa_wpa2_enterprise_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test,
|
||||
@pytest.mark.shivamt
|
||||
def test_wpa_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][0]
|
||||
@@ -230,9 +211,6 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -242,8 +220,8 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa_wpa2_enterprise_5g(self, get_vif_state, get_ap_logs,
|
||||
station_names_fiveg, setup_profiles,
|
||||
def test_wpa_wpa2_enterprise_5g(self, get_ap_logs,
|
||||
station_names_fiveg,
|
||||
lf_test, get_lf_logs,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][1]
|
||||
@@ -256,9 +234,6 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -268,8 +243,8 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
def test_wpa3_enterprise_mixed_2g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles,
|
||||
def test_wpa3_enterprise_mixed_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog,
|
||||
lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][0]
|
||||
@@ -281,9 +256,6 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
@@ -293,8 +265,8 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa3_enterprise_mixed_5g(self, get_vif_state, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles,
|
||||
def test_wpa3_enterprise_mixed_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg,
|
||||
lf_test,
|
||||
update_report, exit_on_fail,
|
||||
test_cases, radius_info):
|
||||
@@ -307,9 +279,6 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
if ssid_name not in get_vif_state:
|
||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
|
||||
@@ -509,10 +509,8 @@ class Fixtures_2x:
|
||||
if mode == "wpa2_enterprise":
|
||||
for j in profile_data["ssid"][mode]:
|
||||
if "radius_auth_data" in j:
|
||||
print("yes")
|
||||
var = True
|
||||
else:
|
||||
print("no")
|
||||
var = False
|
||||
for j in profile_data["ssid"][mode]:
|
||||
if mode in get_markers.keys() and get_markers[mode]:
|
||||
@@ -579,7 +577,63 @@ class Fixtures_2x:
|
||||
except Exception as e:
|
||||
print(e)
|
||||
test_cases["wpa_eap"] = False
|
||||
|
||||
if mode == "wpa_wpa2_enterprise_mixed": # -------WPA WPA2 Enterprise Mixed----------------
|
||||
for j in profile_data["ssid"][mode]:
|
||||
if mode in get_markers.keys() and get_markers[mode]:
|
||||
try:
|
||||
if j["appliedRadios"].__contains__("2G"):
|
||||
lf_dut_data.append(j)
|
||||
if j["appliedRadios"].__contains__("5G"):
|
||||
lf_dut_data.append(j)
|
||||
j["appliedRadios"] = list(set(j["appliedRadios"]))
|
||||
j['security'] = "wpa-mixed"
|
||||
RADIUS_SERVER_DATA = radius_info
|
||||
RADIUS_ACCOUNTING_DATA = radius_accounting_info
|
||||
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j, radius=True,
|
||||
radius_auth_data=RADIUS_SERVER_DATA,
|
||||
radius_accounting_data=RADIUS_ACCOUNTING_DATA)
|
||||
test_cases["wpa_eap"] = True
|
||||
except Exception as e:
|
||||
print(e)
|
||||
test_cases["wpa_eap"] = False
|
||||
if mode == "wpa3_enterprise_mixed": # -------WPA3 Enterprise Mixed----------------
|
||||
for j in profile_data["ssid"][mode]:
|
||||
if mode in get_markers.keys() and get_markers[mode]:
|
||||
try:
|
||||
if j["appliedRadios"].__contains__("2G"):
|
||||
lf_dut_data.append(j)
|
||||
if j["appliedRadios"].__contains__("5G"):
|
||||
lf_dut_data.append(j)
|
||||
j["appliedRadios"] = list(set(j["appliedRadios"]))
|
||||
j['security'] = "wpa3-mixed"
|
||||
RADIUS_SERVER_DATA = radius_info
|
||||
RADIUS_ACCOUNTING_DATA = radius_accounting_info
|
||||
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j, radius=True,
|
||||
radius_auth_data=RADIUS_SERVER_DATA,
|
||||
radius_accounting_data=RADIUS_ACCOUNTING_DATA)
|
||||
test_cases["wpa_eap"] = True
|
||||
except Exception as e:
|
||||
print(e)
|
||||
test_cases["wpa_eap"] = False
|
||||
if mode == "wpa3_192_enterprise": # -------WPA3 192 Enterprise Mixed----------------
|
||||
for j in profile_data["ssid"][mode]:
|
||||
if mode in get_markers.keys() and get_markers[mode]:
|
||||
try:
|
||||
if j["appliedRadios"].__contains__("2G"):
|
||||
lf_dut_data.append(j)
|
||||
if j["appliedRadios"].__contains__("5G"):
|
||||
lf_dut_data.append(j)
|
||||
j["appliedRadios"] = list(set(j["appliedRadios"]))
|
||||
j['security'] = "wpa3-192"
|
||||
RADIUS_SERVER_DATA = radius_info
|
||||
RADIUS_ACCOUNTING_DATA = radius_accounting_info
|
||||
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j, radius=True,
|
||||
radius_auth_data=RADIUS_SERVER_DATA,
|
||||
radius_accounting_data=RADIUS_ACCOUNTING_DATA)
|
||||
test_cases["wpa_eap"] = True
|
||||
except Exception as e:
|
||||
print(e)
|
||||
test_cases["wpa_eap"] = False
|
||||
try:
|
||||
if parameter['express-wifi']:
|
||||
instantiate_profile_obj.set_express_wifi(open_flow=open_flow)
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
"CONFIGURATION" : {
|
||||
"basic-01": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -38,10 +38,10 @@
|
||||
"AX-Station-Name": "ax"
|
||||
}
|
||||
}
|
||||
},
|
||||
},
|
||||
"basic-02": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -76,10 +76,10 @@
|
||||
"AX-Station-Name": "ax"
|
||||
}
|
||||
}
|
||||
},
|
||||
},
|
||||
"basic-03": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -114,10 +114,10 @@
|
||||
"AX-Station-Name": "ax"
|
||||
}
|
||||
}
|
||||
},
|
||||
},
|
||||
"basic-03a": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -155,7 +155,7 @@
|
||||
},
|
||||
"basic-04": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -190,10 +190,10 @@
|
||||
"AX-Station-Name": "ax"
|
||||
}
|
||||
}
|
||||
},
|
||||
},
|
||||
"basic-05": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -228,10 +228,10 @@
|
||||
"AX-Station-Name": "ax"
|
||||
}
|
||||
}
|
||||
},
|
||||
},
|
||||
"basic-06": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -266,10 +266,10 @@
|
||||
"AX-Station-Name": "ax"
|
||||
}
|
||||
}
|
||||
},
|
||||
},
|
||||
"basic-07": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -304,10 +304,10 @@
|
||||
"AX-Station-Name": "ax"
|
||||
}
|
||||
}
|
||||
},
|
||||
},
|
||||
"basic-08": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -342,11 +342,11 @@
|
||||
"AX-Station-Name": "ax"
|
||||
}
|
||||
}
|
||||
},
|
||||
},
|
||||
|
||||
"advanced-01": {
|
||||
"controller": {
|
||||
"url":"https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url":"https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -354,12 +354,12 @@
|
||||
{
|
||||
"model": "cig_wf194c4",
|
||||
"mode": "wifi6",
|
||||
"serial": "f40b9fe78e03",
|
||||
"serial": "f40b9fe78e03",
|
||||
"jumphost": true,
|
||||
"ip": "10.28.3.102",
|
||||
"ip": "10.28.3.102",
|
||||
"username": "lanforge",
|
||||
"password": "pumpkin77",
|
||||
"port": 22,
|
||||
"port": 22,
|
||||
"jumphost_tty": "/dev/ttyAP2",
|
||||
"version": "release-latest"
|
||||
}
|
||||
@@ -385,7 +385,7 @@
|
||||
},
|
||||
"advanced-02": {
|
||||
"controller": {
|
||||
"url":"https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url":"https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -424,7 +424,7 @@
|
||||
},
|
||||
"mesh-01": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -461,7 +461,7 @@
|
||||
"mode": "wifi6",
|
||||
"serial": "903cb39d692c",
|
||||
"jumphost": true,
|
||||
"ip": "10.28.3.101",
|
||||
"ip": "10.28.3.101",
|
||||
"username": "lanforge",
|
||||
"password": "pumpkin77",
|
||||
"port": 22,
|
||||
@@ -509,7 +509,7 @@
|
||||
},
|
||||
"mesh-02": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -596,7 +596,7 @@
|
||||
|
||||
"interop-01": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -637,7 +637,7 @@
|
||||
|
||||
"interop-02": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -678,7 +678,7 @@
|
||||
|
||||
"interop-03": {
|
||||
"controller": {
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"url": "https://sec-qa01.cicd.lab.wlan.tip.build:16001",
|
||||
"username": "tip@ucentral.com",
|
||||
"password": "OpenWifi%123"
|
||||
},
|
||||
@@ -719,7 +719,7 @@
|
||||
|
||||
"basic-ext-03-03": {
|
||||
"controller": {
|
||||
"url": "https://wlan-portal-svc-nola-ext-03.cicd.lab.wlan.tip.build",
|
||||
"url": "https://wlan-portal-svc-nola-ext-03.cicd.lab.wlan.tip.build",
|
||||
"username": "support@example.com",
|
||||
"password": "support",
|
||||
"version": "1.1.0-SNAPSHOT",
|
||||
@@ -889,5 +889,5 @@
|
||||
"open_flow":{}
|
||||
|
||||
|
||||
|
||||
|
||||
}
|
||||
Reference in New Issue
Block a user