mirror of
https://github.com/Telecominfraproject/wlan-testing.git
synced 2026-01-27 10:23:37 +00:00
Wifi 7233 (#438)
* Added start_sniffer and stop_sniffer method Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added ssid channel Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added get_ap_channel fixture Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Removed get_vif_state and added get_ap_channel and added ssid_channel Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * added get_ap_channel and added ssid_channel Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * changed pcap file name Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added print for check get_ap_channel output Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * changed code logic in get_ap_channel Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * changed duration in Client_Connectivity Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * added try except in scan_ssid and also changed code logic in eap_connect, Client_Connectivity Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * removed setup_profiles Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added table format for station data and cx data, Added assert false message Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added arguments in table2 method Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added assert Fail message Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * changed logic for creating cx_data table Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added print statement Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added Before and After in station data table Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added set_radio_channel method, addded unknown error message Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added assert condition Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * removed older ssid from scan result Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * resolved merge conflicts Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added setup_params_enterprise_two Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added ssid_channel Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added ax radio for sniffing Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com>
This commit is contained in:
@@ -32,6 +32,7 @@ import time
|
||||
import string
|
||||
import random
|
||||
import csv
|
||||
from datetime import datetime
|
||||
from pull_report import Report
|
||||
from scp_util import SCP_File
|
||||
|
||||
@@ -56,13 +57,18 @@ from LANforge.lfcli_base import LFCliBase
|
||||
from lf_tr398_test import TR398Test
|
||||
from lf_pcap import LfPcap
|
||||
from sta_scan_test import StaScan
|
||||
from lf_sniff_radio import SniffRadio
|
||||
|
||||
cv_test_reports = importlib.import_module("py-json.cv_test_reports")
|
||||
lf_report = cv_test_reports.lanforge_reports
|
||||
realm = importlib.import_module("py-json.realm")
|
||||
Realm = realm.Realm
|
||||
|
||||
|
||||
class RunTest:
|
||||
|
||||
def __init__(self, configuration_data=None, local_report_path="../reports/", influx_params=None, run_lf=False, debug=False):
|
||||
def __init__(self, configuration_data=None, local_report_path="../reports/", influx_params=None, run_lf=False,
|
||||
debug=False):
|
||||
if "type" in configuration_data['traffic_generator'].keys():
|
||||
if lanforge_data["type"] == "mesh":
|
||||
self.lanforge_ip = lanforge_data["ip"]
|
||||
@@ -122,9 +128,8 @@ class RunTest:
|
||||
if not os.path.exists(self.local_report_path):
|
||||
os.mkdir(self.local_report_path)
|
||||
|
||||
|
||||
def Client_Connectivity(self, ssid="[BLANK]", passkey="[BLANK]", security="open", extra_securities=[],
|
||||
station_name=[], mode="BRIDGE", vlan_id=1, band="twog"):
|
||||
station_name=[], mode="BRIDGE", vlan_id=1, band="twog", ssid_channel=None):
|
||||
"""SINGLE CLIENT CONNECTIVITY using test_connect2.py"""
|
||||
self.staConnect = StaConnect2(self.lanforge_ip, self.lanforge_port, debug_=self.debug)
|
||||
|
||||
@@ -154,8 +159,19 @@ class RunTest:
|
||||
self.staConnect.radio = self.fiveg_radios[0]
|
||||
self.staConnect.reset_port(self.staConnect.radio)
|
||||
self.staConnect.sta_prefix = self.fiveg_prefix
|
||||
print("scand ssid radio", self.staConnect.radio.split(".")[2])
|
||||
self.scan_ssid(radio=self.staConnect.radio.split(".")[2])
|
||||
self.set_radio_channel(radio=self.staConnect.radio, channel=ssid_channel)
|
||||
print("scan ssid radio", self.staConnect.radio.split(".")[2])
|
||||
self.data_scan_ssid = self.scan_ssid(radio=self.staConnect.radio.split(".")[2])
|
||||
print("ssid scan data :- ", self.data_scan_ssid)
|
||||
result = self.check_ssid_available_scan_result(scan_ssid_data=self.data_scan_ssid, ssid=ssid)
|
||||
print("ssid available:-", result)
|
||||
if not result and ssid_channel:
|
||||
print("sniff radio", self.ax_radios[0].split(".")[2])
|
||||
self.start_sniffer(radio_channel=ssid_channel, radio=self.ax_radios[0].split(".")[2], duration=30)
|
||||
time.sleep(30)
|
||||
self.stop_sniffer()
|
||||
print("ssid not available in scan result")
|
||||
return "FAIL", "ssid not available in scan result"
|
||||
self.staConnect.resource = 1
|
||||
self.staConnect.dut_ssid = ssid
|
||||
self.staConnect.dut_passwd = passkey
|
||||
@@ -164,22 +180,37 @@ class RunTest:
|
||||
self.staConnect.runtime_secs = 40
|
||||
self.staConnect.bringup_time_sec = 80
|
||||
self.staConnect.cleanup_on_exit = True
|
||||
data_table = ""
|
||||
dict_table = {}
|
||||
self.staConnect.setup(extra_securities=extra_securities)
|
||||
for sta_name in self.staConnect.station_names:
|
||||
try:
|
||||
sta_url = self.staConnect.get_station_url(sta_name)
|
||||
station_info = self.staConnect.json_get(sta_url)
|
||||
dict_data = station_info["interface"]
|
||||
dict_table[""] = list(dict_data.keys())
|
||||
dict_table["Before"] = list(dict_data.values())
|
||||
except Exception as e:
|
||||
print(e)
|
||||
if ssid_channel:
|
||||
print("sniff radio", self.ax_radios[0].split(".")[2])
|
||||
self.start_sniffer(radio_channel=ssid_channel, radio=self.ax_radios[0].split(".")[2], duration=30)
|
||||
self.staConnect.start()
|
||||
print("napping %f sec" % self.staConnect.runtime_secs)
|
||||
time.sleep(self.staConnect.runtime_secs)
|
||||
report_obj = Report()
|
||||
for sta_name in self.staConnect.station_names:
|
||||
try:
|
||||
station_data_str = ""
|
||||
sta_url = self.staConnect.get_station_url(sta_name)
|
||||
station_info = self.staConnect.json_get(sta_url)
|
||||
self.station_ip = station_info["interface"]["ip"]
|
||||
for i in station_info["interface"]:
|
||||
try:
|
||||
station_data_str = station_data_str + i + " : " + str(station_info["interface"][i]) + "\n"
|
||||
except Exception as e:
|
||||
print(e)
|
||||
allure.attach(name=str(sta_name), body=str(station_data_str))
|
||||
dict_data = station_info["interface"]
|
||||
dict_table["After"] = list(dict_data.values())
|
||||
try:
|
||||
data_table = report_obj.table2(table=dict_table, headers='keys')
|
||||
except Exception as e:
|
||||
print(e)
|
||||
allure.attach(name=str(sta_name), body=data_table)
|
||||
except Exception as e:
|
||||
print(e)
|
||||
self.staConnect.stop()
|
||||
@@ -203,31 +234,47 @@ class RunTest:
|
||||
|
||||
for result in run_results:
|
||||
print("test result: " + result)
|
||||
result = True
|
||||
result = "PASS"
|
||||
description = "Unknown error"
|
||||
dict_table = {}
|
||||
print("Client Connectivity :", self.staConnect.passes)
|
||||
endp_data = []
|
||||
for i in self.staConnect.resulting_endpoints:
|
||||
endp_data.append(self.staConnect.resulting_endpoints[i]["endpoint"])
|
||||
cx_data = ""
|
||||
for i in endp_data:
|
||||
for j in i:
|
||||
cx_data = cx_data + str(j) + " : " + str(i[j]) + "\n"
|
||||
cx_data = cx_data + "\n"
|
||||
allure.attach(name="cx_data", body=str(cx_data))
|
||||
dict_table["key"] = [i for s in [d.keys() for d in endp_data] for i in s]
|
||||
dict_table["value"] = [i for s in [d.values() for d in endp_data] for i in s]
|
||||
data_table = report_obj.table2(table=dict_table, headers='keys')
|
||||
allure.attach(name="cx_data", body=data_table)
|
||||
for i in range(len(run_results)):
|
||||
if i == 0:
|
||||
if "FAILED" in run_results[i]:
|
||||
result = "FAIL"
|
||||
description = "Station did not get an ip"
|
||||
break
|
||||
else:
|
||||
if "FAILED" in run_results[i]:
|
||||
result = "FAIL"
|
||||
description = "did not report traffic"
|
||||
|
||||
if self.staConnect.passes():
|
||||
print("client connection to", self.staConnect.dut_ssid, "successful. Test Passed")
|
||||
result = "PASS"
|
||||
else:
|
||||
print("client connection to", self.staConnect.dut_ssid, "unsuccessful. Test Failed")
|
||||
result = False
|
||||
result = "FAIL"
|
||||
time.sleep(3)
|
||||
return self.staConnect.passes(), result
|
||||
if ssid_channel:
|
||||
self.stop_sniffer()
|
||||
self.set_radio_channel(radio=self.staConnect.radio, channel="AUTO")
|
||||
return result, description
|
||||
|
||||
def EAP_Connect(self, ssid="[BLANK]", passkey="[BLANK]", security="wpa2", extra_securities=[],
|
||||
mode="BRIDGE", band="twog", vlan_id=100,
|
||||
station_name=[], key_mgmt="WPA-EAP",
|
||||
pairwise="NA", group="NA", wpa_psk="DEFAULT",
|
||||
ttls_passwd="nolastart", ieee80211w=1,
|
||||
wep_key="NA", ca_cert="NA", eap="TTLS", identity="nolaradius", d_vlan=False, cleanup=True):
|
||||
wep_key="NA", ca_cert="NA", eap="TTLS", identity="nolaradius", d_vlan=False, cleanup=True,
|
||||
ssid_channel=None):
|
||||
self.eap_connect = TTLSTest(host=self.lanforge_ip, port=self.lanforge_port,
|
||||
sta_list=station_name, vap=False, _debug_on=self.debug)
|
||||
|
||||
@@ -261,8 +308,19 @@ class RunTest:
|
||||
self.eap_connect.admin_up(self.eap_connect.radio)
|
||||
# self.eap_connect.sta_prefix = self.fiveg_prefix
|
||||
# self.eap_connect.resource = 1
|
||||
print("scand ssid radio", self.eap_connect.radio.split(".")[2])
|
||||
self.scan_ssid(radio=self.eap_connect.radio.split(".")[2])
|
||||
self.set_radio_channel(radio=self.eap_connect.radio, channel=ssid_channel)
|
||||
print("scan ssid radio", self.eap_connect.radio.split(".")[2])
|
||||
self.data_scan_ssid = self.scan_ssid(radio=self.eap_connect.radio.split(".")[2])
|
||||
print("ssid scan data :- ", self.data_scan_ssid)
|
||||
result = self.check_ssid_available_scan_result(scan_ssid_data=self.data_scan_ssid, ssid=ssid)
|
||||
print("ssid available:-", result)
|
||||
if not result and ssid_channel:
|
||||
print("sniff radio", self.ax_radios[0].split(".")[2])
|
||||
self.start_sniffer(radio_channel=ssid_channel, radio=self.ax_radios[0].split(".")[2], duration=30)
|
||||
time.sleep(30)
|
||||
self.stop_sniffer()
|
||||
print("ssid not available in scan result")
|
||||
return "FAIL", "ssid not available in scan result"
|
||||
if eap == "TTLS":
|
||||
self.eap_connect.ieee80211w = ieee80211w
|
||||
self.eap_connect.key_mgmt = key_mgmt
|
||||
@@ -288,6 +346,20 @@ class RunTest:
|
||||
self.eap_connect.security = security
|
||||
self.eap_connect.sta_list = station_name
|
||||
self.eap_connect.build(extra_securities=extra_securities)
|
||||
dict_table = {}
|
||||
report_obj = Report()
|
||||
data_table = ""
|
||||
for sta_name in station_name:
|
||||
try:
|
||||
station_info = self.eap_connect.json_get("port/1/1/" + sta_name)
|
||||
dict_data = station_info["interface"]
|
||||
dict_table[""] = list(dict_data.keys())
|
||||
dict_table["Before"] = list(dict_data.values())
|
||||
except Exception as e:
|
||||
print(e)
|
||||
if ssid_channel:
|
||||
print("sniff radio", self.ax_radios[0].split(".")[2])
|
||||
self.start_sniffer(radio_channel=ssid_channel, radio=self.ax_radios[0].split(".")[2], duration=30)
|
||||
self.eap_connect.start(station_name, True, True)
|
||||
if d_vlan:
|
||||
self.station_ip = {}
|
||||
@@ -298,19 +370,18 @@ class RunTest:
|
||||
# station_info = self.eap_connect.json_get(sta_url)
|
||||
station_info = self.eap_connect.json_get("port/1/1/" + sta_name)
|
||||
|
||||
for i in station_info["interface"]:
|
||||
try:
|
||||
station_data_str = station_data_str + i + " : " + str(station_info["interface"][i]) + "\n"
|
||||
if d_vlan:
|
||||
if i == "ip":
|
||||
self.station_ip[sta_name] = station_info["interface"][i]
|
||||
except Exception as e:
|
||||
print(e)
|
||||
allure.attach(name=str(sta_name), body=str(station_data_str))
|
||||
dict_data = station_info["interface"]
|
||||
dict_table["After"] = list(dict_data.values())
|
||||
try:
|
||||
data_table = report_obj.table2(table=dict_table, headers='keys')
|
||||
except Exception as e:
|
||||
print(e)
|
||||
allure.attach(name=str(sta_name), body=data_table)
|
||||
# except Exception as e:
|
||||
# print(e)
|
||||
|
||||
self.eap_connect.stop()
|
||||
run_results = self.eap_connect.get_result_list()[1:]
|
||||
try:
|
||||
supplicant = "/home/lanforge/wifi/wpa_supplicant_log_" + self.eap_connect.radio.split(".")[2] + ".txt"
|
||||
obj = SCP_File(ip=self.lanforge_ip, port=self.lanforge_ssh_port, username="root", password="lanforge",
|
||||
@@ -327,17 +398,36 @@ class RunTest:
|
||||
print("test result: " + self.eap_connect.passes())
|
||||
pytest.exit("Test Failed: Debug True")
|
||||
endp_data = []
|
||||
result = "PASS"
|
||||
description = "Unknown error"
|
||||
dict_table = {}
|
||||
for i in self.eap_connect.resulting_endpoints:
|
||||
endp_data.append(self.eap_connect.resulting_endpoints[i]["endpoint"])
|
||||
cx_data = ""
|
||||
for i in endp_data:
|
||||
for j in i:
|
||||
cx_data = cx_data + str(j) + " : " + str(i[j]) + "\n"
|
||||
cx_data = cx_data + "\n"
|
||||
allure.attach(name="cx_data", body=str(cx_data))
|
||||
# finding all keys and values
|
||||
dict_table["key"] = [i for s in [d.keys() for d in endp_data] for i in s]
|
||||
dict_table["value"] = [i for s in [d.values() for d in endp_data] for i in s]
|
||||
data_table = report_obj.table2(table=dict_table, headers='keys')
|
||||
allure.attach(name="cx_data", body=data_table)
|
||||
for i in range(len(run_results)):
|
||||
if i == 0:
|
||||
if "FAILED" in run_results[i]:
|
||||
result = "FAIL"
|
||||
description = "Station did not get an ip"
|
||||
break
|
||||
else:
|
||||
if "FAILED" in run_results[i]:
|
||||
result = "FAIL"
|
||||
description = "did not report traffic"
|
||||
if cleanup:
|
||||
self.eap_connect.cleanup(station_name)
|
||||
return self.eap_connect.passes()
|
||||
if self.eap_connect.passes():
|
||||
result = "PASS"
|
||||
else:
|
||||
result = "FAIL"
|
||||
if ssid_channel:
|
||||
self.stop_sniffer()
|
||||
self.set_radio_channel(radio=self.eap_connect.radio, channel="AUTO")
|
||||
return result, description
|
||||
|
||||
def wifi_capacity(self, mode="BRIDGE", vlan_id=100, batch_size="1,5,10,20,40,64,128",
|
||||
instance_name="wct_instance", download_rate="1Gbps", influx_tags="",
|
||||
@@ -427,7 +517,8 @@ class RunTest:
|
||||
if band == "ax":
|
||||
self.client_connect.radio = self.ax_radios[0]
|
||||
print("scan ssid radio", self.client_connect.radio.split(".")[2])
|
||||
self.scan_ssid(radio=self.client_connect.radio.split(".")[2])
|
||||
self.data_scan_ssid = self.scan_ssid(radio=self.client_connect.radio.split(".")[2])
|
||||
print("ssid scan data :- ", self.data_scan_ssid)
|
||||
self.client_connect.build()
|
||||
self.client_connect.wait_for_ip(station_name)
|
||||
print(self.client_connect.wait_for_ip(station_name))
|
||||
@@ -1015,6 +1106,7 @@ class RunTest:
|
||||
self.Client_disconnect(station_name=station_name)
|
||||
return atten_serial_radio
|
||||
|
||||
|
||||
def set_radio_country_channel(self,_radio="wiphy0",_channel=0,_country_num=840,): # 840 - US
|
||||
data = {
|
||||
"shelf": _radio[0],
|
||||
@@ -1024,6 +1116,90 @@ class RunTest:
|
||||
"channel": _channel,
|
||||
"country": _country_num
|
||||
}
|
||||
print(f"Lanforge-radio Country changed {_country_num}")
|
||||
self.local_realm.json_post("/cli-json/set_wifi_radio", _data=data)
|
||||
|
||||
def downlink_mu_mimo(self, radios_2g=[], radios_5g=[], radios_ax=[], dut_name="TIP", dut_5g="", dut_2g="",
|
||||
mode="BRIDGE", vlan_id=1, skip_2g=True, skip_5g=False):
|
||||
raw_line = []
|
||||
skip_twog = '1' if skip_2g else '0'
|
||||
skip_fiveg = '1' if skip_5g else '0'
|
||||
sniff_radio = 'wiphy6'
|
||||
channel = 149 if skip_2g else 11
|
||||
upstream_port = self.upstream_port
|
||||
|
||||
sets = [['Calibrate Attenuators', '0'], ['Receiver Sensitivity', '0'], ['Maximum Connection', '0'],
|
||||
['Maximum Throughput', '0'], ['Airtime Fairness', '0'], ['Range Versus Rate', '0'],
|
||||
['Spatial Consistency', '0'],
|
||||
['Multiple STAs Performance', '0'], ['Multiple Assoc Stability', '0'], ['Downlink MU-MIMO', '1'],
|
||||
['AP Coexistence', '0'], ['Long Term Stability', '0'], ['Skip 2.4Ghz Tests', f'{skip_twog}'],
|
||||
['Skip 5Ghz Tests', f'{skip_fiveg}'], ['2.4Ghz Channel', 'AUTO'], ['5Ghz Channel', 'AUTO']]
|
||||
for i in range(6):
|
||||
if i == 0 or i == 2:
|
||||
raw_line.append([f'radio-{i}: {radios_5g[0] if i == 0 else radios_5g[1]}'])
|
||||
if i == 1 or i == 3:
|
||||
raw_line.append([f'radio-{i}: {radios_2g[0] if i == 1 else radios_2g[1]}'])
|
||||
if i == 4 or i == 5:
|
||||
raw_line.append([f'radio-{i}: {radios_ax[0] if i == 4 else radios_ax[1]}'])
|
||||
|
||||
if len(raw_line) != 6:
|
||||
raw_line = [['radio-0: 1.1.5 wiphy1'], ['radio-1: 1.1.4 wiphy0'], ['radio-2: 1.1.7 wiphy3'],
|
||||
['radio-3: 1.1.6 wiphy2'], ['radio-4: 1.1.8 wiphy4'], ['radio-5: 1.1.9 wiphy5']]
|
||||
instance_name = "tr398-instance-{}".format(str(random.randint(0, 100000)))
|
||||
|
||||
if not os.path.exists("mu-mimo-config.txt"):
|
||||
with open("mu-mimo-config.txt", "wt") as f:
|
||||
for i in raw_line:
|
||||
f.write(str(i[0]) + "\n")
|
||||
f.close()
|
||||
|
||||
if mode == "BRIDGE" or mode == "NAT":
|
||||
upstream_port = self.upstream_port
|
||||
else:
|
||||
upstream_port = self.upstream_port + "." + str(vlan_id)
|
||||
print("Upstream Port: ", self.upstream_port)
|
||||
|
||||
self.pcap_obj = LfPcap(host=self.lanforge_ip, port=self.lanforge_port)
|
||||
self.cvtest_obj = TR398Test(lf_host=self.lanforge_ip,
|
||||
lf_port=self.lanforge_port,
|
||||
lf_user="lanforge",
|
||||
lf_password="lanforge",
|
||||
instance_name=instance_name,
|
||||
config_name="cv_dflt_cfg",
|
||||
upstream="1.1." + upstream_port,
|
||||
pull_report=True,
|
||||
local_lf_report_dir=self.local_report_path,
|
||||
load_old_cfg=False,
|
||||
dut2=dut_2g,
|
||||
dut5=dut_5g,
|
||||
raw_lines_file="mu-mimo-config.txt",
|
||||
enables=[],
|
||||
disables=[],
|
||||
raw_lines=[],
|
||||
sets=sets,
|
||||
test_rig=dut_name
|
||||
)
|
||||
self.cvtest_obj.setup()
|
||||
t1 = threading.Thread(target=self.cvtest_obj.run)
|
||||
t1.start()
|
||||
# t2 = threading.Thread(target=self.pcap_obj.sniff_packets, args=(sniff_radio, "mu-mimo", channel, 60))
|
||||
# if t1.is_alive():
|
||||
# time.sleep(180)
|
||||
# t2.start()
|
||||
while t1.is_alive():
|
||||
time.sleep(1)
|
||||
if os.path.exists("mu-mimo-config.txt"):
|
||||
os.remove("mu-mimo-config.txt")
|
||||
|
||||
report_name = self.cvtest_obj.report_name[0]['LAST']["response"].split(":::")[1].split("/")[-1]
|
||||
influx = CSVtoInflux(influx_host=self.influx_params["influx_host"],
|
||||
influx_port=self.influx_params["influx_port"],
|
||||
influx_org=self.influx_params["influx_org"],
|
||||
influx_token=self.influx_params["influx_token"],
|
||||
influx_bucket=self.influx_params["influx_bucket"],
|
||||
path=report_name)
|
||||
influx.glob()
|
||||
return self.cvtest_obj
|
||||
|
||||
print(f"Lanforge-radio Country changed {_country_num}")
|
||||
self.local_realm.json_post("/cli-json/set_wifi_radio", _data=data)
|
||||
@@ -1111,19 +1287,70 @@ class RunTest:
|
||||
|
||||
def scan_ssid(self, radio=""):
|
||||
'''This method for scan ssid data'''
|
||||
obj_scan = StaScan(host=self.lanforge_ip, port=self.lanforge_port, ssid="fake ssid", security="open", password="[BLANK]", radio=radio, sta_list=["sta0000"], csv_output="scan_ssid.csv")
|
||||
list_data = []
|
||||
obj_scan = StaScan(host=self.lanforge_ip, port=self.lanforge_port, ssid="fake ssid", security="open",
|
||||
password="[BLANK]", radio=radio, sta_list=["sta0000"], csv_output="scan_ssid.csv")
|
||||
obj_scan.pre_cleanup()
|
||||
time1 = datetime.now()
|
||||
first = time.mktime(time1.timetuple()) * 1000
|
||||
obj_scan.build()
|
||||
obj_scan.start()
|
||||
with open(obj_scan.csv_output, 'r') as file:
|
||||
reader = csv.reader(file)
|
||||
list_data = []
|
||||
for row in reader:
|
||||
list_data.append(row)
|
||||
time2 = datetime.now()
|
||||
second = time.mktime(time2.timetuple()) * 1000
|
||||
diff = int(second - first)
|
||||
try:
|
||||
with open(obj_scan.csv_output, 'r') as file:
|
||||
reader = csv.reader(file)
|
||||
for row in reader:
|
||||
if row[1] == "age":
|
||||
list_data.append(row)
|
||||
continue
|
||||
elif int(row[1]) < diff:
|
||||
list_data.append(row)
|
||||
except Exception as e:
|
||||
print(e)
|
||||
report_obj = Report()
|
||||
csv_data_table = report_obj.table2(list_data)
|
||||
allure.attach(name="scan_ssid_data", body=csv_data_table)
|
||||
obj_scan.cleanup()
|
||||
return list_data
|
||||
|
||||
def start_sniffer(self, radio_channel=None, radio=None, test_name="sniff_radio", duration=60):
|
||||
self.pcap_name = test_name + ".pcap"
|
||||
self.pcap_obj = SniffRadio(lfclient_host=self.lanforge_ip, lfclient_port=self.lanforge_port, radio=radio,
|
||||
channel=radio_channel)
|
||||
self.pcap_obj.setup(0, 0, 0)
|
||||
time.sleep(5)
|
||||
self.pcap_obj.monitor.admin_up()
|
||||
time.sleep(5)
|
||||
self.pcap_obj.monitor.start_sniff(capname=self.pcap_name, duration_sec=duration)
|
||||
|
||||
def stop_sniffer(self):
|
||||
self.pcap_obj.monitor.admin_down()
|
||||
time.sleep(2)
|
||||
self.pcap_obj.cleanup()
|
||||
lf_report.pull_reports(hostname=self.lanforge_ip, port=self.lanforge_ssh_port, username="lanforge",
|
||||
password="lanforge",
|
||||
report_location="/home/lanforge/" + self.pcap_name,
|
||||
report_dir=".")
|
||||
allure.attach.file(source=self.pcap_name,
|
||||
name="pcap_file", attachment_type=allure.attachment_type.PCAP)
|
||||
print("pcap file name : ", self.pcap_name)
|
||||
return self.pcap_name
|
||||
|
||||
def check_ssid_available_scan_result(self, scan_ssid_data=None, ssid=None):
|
||||
'''This method will check ssid available or not in scan ssid data'''
|
||||
try:
|
||||
flag = False
|
||||
for i in scan_ssid_data:
|
||||
if ssid in i:
|
||||
flag = True
|
||||
if flag:
|
||||
return True
|
||||
else:
|
||||
return False
|
||||
except Exception as e:
|
||||
print(e)
|
||||
|
||||
def country_code_channel_division(self, ssid = "[BLANK]", passkey='[BLANK]', security="wpa2", mode="BRIDGE",
|
||||
band='2G', station_name=[], vlan_id=100, channel='1', channel_width=20,
|
||||
@@ -1132,7 +1359,7 @@ class RunTest:
|
||||
radio = (self.fiveg_radios[0] if band == "fiveg" else self.twog_radios[0]).split('.')
|
||||
self.set_radio_country_channel(_radio=radio,_country_num=country_num)
|
||||
station = self.Client_Connect(ssid=ssid, passkey=passkey, security=security, mode=mode, band=band,
|
||||
station_name=station_name, vlan_id=vlan_id)
|
||||
station_name=station_name, vlan_id=vlan_id)
|
||||
if station:
|
||||
for i in range(10):
|
||||
station_info = station.json_get(f"/port/1/1/{station_name[0]}")
|
||||
@@ -1169,6 +1396,26 @@ class RunTest:
|
||||
else:
|
||||
return False
|
||||
|
||||
def set_radio_channel(self, radio="1.1.wiphy0", channel="AUTO"):
|
||||
try:
|
||||
radio = radio.split(".")
|
||||
shelf = radio[0]
|
||||
resource = radio[1]
|
||||
radio_ = radio[2]
|
||||
print("radio %s channel %s" % (radio, channel))
|
||||
local_realm_obj = realm.Realm(lfclient_host=self.lanforge_ip, lfclient_port=self.lanforge_port)
|
||||
data = {
|
||||
"shelf": shelf,
|
||||
"resource": resource,
|
||||
"radio": radio_,
|
||||
"mode": "NA",
|
||||
"channel": channel
|
||||
}
|
||||
local_realm_obj.json_post("/cli-json/set_wifi_radio", _data=data)
|
||||
time.sleep(2)
|
||||
except Exception as e:
|
||||
print(e)
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
influx_host = "influx.cicd.lab.wlan.tip.build"
|
||||
|
||||
@@ -15,7 +15,7 @@ class Report:
|
||||
x = tabulate(table, headers="keys", tablefmt="fancy_grid")
|
||||
return x
|
||||
|
||||
def table2(self, table):
|
||||
def table2(self, table=None, headers='firstrow', tablefmt='fancy_grid'):
|
||||
self.table = table
|
||||
x = tabulate(self.table, headers='firstrow', tablefmt='fancy_grid')
|
||||
x = tabulate(self.table, headers=headers, tablefmt=tablefmt)
|
||||
return x
|
||||
@@ -6,6 +6,7 @@ import os
|
||||
import random
|
||||
import string
|
||||
import sys
|
||||
import re
|
||||
|
||||
import allure
|
||||
|
||||
@@ -796,3 +797,31 @@ def get_apnos_max_clients(get_apnos, get_configuration):
|
||||
except Exception as e:
|
||||
pass
|
||||
yield all_logs
|
||||
|
||||
@pytest.fixture(scope="function")
|
||||
def get_ap_channel(get_apnos, get_configuration):
|
||||
all_data = []
|
||||
dict_band_channel = {}
|
||||
for ap in get_configuration['access_point']:
|
||||
ap_ssh = get_apnos(ap, pwd="../libs/apnos/", sdk="2.x")
|
||||
a = ap_ssh.run_generic_command(cmd="iw dev | grep channel")
|
||||
print("ap command output:- ", a)
|
||||
try:
|
||||
a = a[1:]
|
||||
for i in a:
|
||||
if i == '':
|
||||
continue
|
||||
j = int(re.findall('\d+', i)[0])
|
||||
print(j)
|
||||
if j >= 36:
|
||||
dict_band_channel["5G"] = j
|
||||
continue
|
||||
elif j < 36:
|
||||
dict_band_channel["2G"] = j
|
||||
continue
|
||||
all_data.append(dict_band_channel)
|
||||
except Exception as e:
|
||||
print(e)
|
||||
pass
|
||||
print(all_data)
|
||||
yield all_data
|
||||
@@ -2,7 +2,8 @@ import allure
|
||||
import pytest
|
||||
|
||||
pytestmark = [pytest.mark.client_connectivity,
|
||||
pytest.mark.vlan, pytest.mark.enterprise, pytest.mark.tls, pytest.mark.uc_sanity]
|
||||
pytest.mark.bridge, pytest.mark.enterprise, pytest.mark.tls, pytest.mark.uc_sanity]
|
||||
|
||||
|
||||
setup_params_enterprise = {
|
||||
"mode": "BRIDGE",
|
||||
@@ -39,7 +40,7 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
@pytest.mark.twog
|
||||
def test_tls_wpa_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
@@ -50,6 +51,9 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
print("output of get_ap_channel ", get_ap_channel)
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid 2G channel:- ", channel)
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
@@ -57,19 +61,19 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
key_mgmt=key_mgmt, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_wpa_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
update_report, exit_on_fail,
|
||||
test_cases, radius_info):
|
||||
test_cases, radius_info, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
@@ -80,6 +84,9 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
print("output of get_ap_channel ", get_ap_channel)
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid 5G channel:- ", channel)
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
@@ -87,18 +94,19 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_fiveg,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
key_mgmt=key_mgmt, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_tls_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
@@ -108,6 +116,8 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
security = "wpa2"
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
@@ -115,19 +125,19 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
key_mgmt=key_mgmt, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
update_report, exit_on_fail,
|
||||
test_cases, radius_info):
|
||||
test_cases, radius_info, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
@@ -137,6 +147,8 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
security = "wpa2"
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
print("output of get_ap_channel ", get_ap_channel)
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
@@ -144,19 +156,19 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_fiveg,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
key_mgmt=key_mgmt, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
@pytest.mark.shivam
|
||||
def test_tls_wpa3_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
@@ -166,6 +178,8 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
@@ -173,19 +187,19 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
key_mgmt=key_mgmt, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_wpa3_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
update_report, exit_on_fail,
|
||||
test_cases, radius_info):
|
||||
test_cases, radius_info, get_ap_channel):
|
||||
""" wpa enterprise 5g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
@@ -195,6 +209,8 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
@@ -202,13 +218,12 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_fiveg,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
key_mgmt=key_mgmt, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes == "PASS", result
|
||||
|
||||
setup_params_enterprise_two = {
|
||||
"mode": "BRIDGE",
|
||||
@@ -224,7 +239,6 @@ setup_params_enterprise_two = {
|
||||
"radius": True
|
||||
}
|
||||
|
||||
|
||||
@allure.suite(suite_name="sanity")
|
||||
@allure.sub_suite(sub_suite_name="Bridge Mode EAP Client Connectivity : Suite-B")
|
||||
@pytest.mark.suiteB
|
||||
@@ -244,7 +258,7 @@ class TestBridgeModeEnterpriseTLSSuiteTwo(object):
|
||||
@pytest.mark.twog
|
||||
def test_wpa_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and twog"
|
||||
"""
|
||||
@@ -254,22 +268,24 @@ class TestBridgeModeEnterpriseTLSSuiteTwo(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and fiveg"
|
||||
"""
|
||||
@@ -279,22 +295,23 @@ class TestBridgeModeEnterpriseTLSSuiteTwo(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes == "PASS", result
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
def test_wpa3_enterprise_mixed_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise_mixed and twog"
|
||||
"""
|
||||
@@ -303,23 +320,26 @@ class TestBridgeModeEnterpriseTLSSuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa3_enterprise_mixed_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
update_report, exit_on_fail,
|
||||
test_cases, radius_info):
|
||||
test_cases, radius_info, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise_mixed and fiveg"
|
||||
"""
|
||||
@@ -328,13 +348,16 @@ class TestBridgeModeEnterpriseTLSSuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes == "PASS", result
|
||||
|
||||
assert passes
|
||||
|
||||
@@ -47,7 +47,7 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
@pytest.mark.twog
|
||||
def test_wpa_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_enterprise and twog"
|
||||
"""
|
||||
@@ -57,22 +57,24 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa_enterprise_5g(self, station_names_fiveg, get_ap_logs, get_lf_logs,
|
||||
setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 5g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_enterprise and fiveg"
|
||||
"""
|
||||
@@ -82,22 +84,24 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
assert passes
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa2_enterprise and twog"
|
||||
"""
|
||||
@@ -106,22 +110,24 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
security = "wpa2"
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
assert passes
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa2_enterprise and fiveg"
|
||||
"""
|
||||
@@ -130,22 +136,24 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
security = "wpa2"
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_wpa3_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
station_names_twog, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise and twog"
|
||||
"""
|
||||
@@ -154,22 +162,24 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa3_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
station_names_fiveg, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise and fiveg"
|
||||
"""
|
||||
@@ -178,16 +188,18 @@ class TestBridgeModeEnterpriseTTLSSuiteA(object):
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
|
||||
setup_params_enterprise_two = {
|
||||
@@ -224,7 +236,7 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
@pytest.mark.twog
|
||||
def test_wpa_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and twog"
|
||||
"""
|
||||
@@ -234,22 +246,24 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and fiveg"
|
||||
"""
|
||||
@@ -259,22 +273,24 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
def test_wpa3_enterprise_mixed_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise_mixed and twog"
|
||||
"""
|
||||
@@ -283,23 +299,25 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa3_enterprise_mixed_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report, exit_on_fail,
|
||||
test_cases, radius_info):
|
||||
test_cases, radius_info, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise_mixed and fiveg"
|
||||
"""
|
||||
@@ -308,13 +326,15 @@ class TestBridgeModeEnterpriseTTLSSuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@@ -52,7 +52,7 @@ class TestBridgeModeConnectivitySuiteA(object):
|
||||
def test_open_ssid_2g(self, get_ap_logs, get_lf_logs, lf_test,
|
||||
update_report,
|
||||
station_names_twog,
|
||||
test_cases):
|
||||
test_cases, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and bridge and general and open and twog"
|
||||
"""
|
||||
@@ -62,18 +62,20 @@ class TestBridgeModeConnectivitySuiteA(object):
|
||||
security = "open"
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.open
|
||||
@pytest.mark.fiveg
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-2801", name="JIRA LINK")
|
||||
def test_open_ssid_5g(self, get_ap_logs, lf_test, test_cases, station_names_fiveg, get_lf_logs,
|
||||
update_report):
|
||||
update_report, get_ap_channel):
|
||||
"""Client Connectivity open ssid 5G
|
||||
pytest -m "client_connectivity and bridge and general and open and fiveg"
|
||||
"""
|
||||
@@ -83,12 +85,14 @@ class TestBridgeModeConnectivitySuiteA(object):
|
||||
security = "open"
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa
|
||||
@@ -96,7 +100,7 @@ class TestBridgeModeConnectivitySuiteA(object):
|
||||
@allure.story('wpa 2.4 GHZ Band')
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-2801", name="JIRA LINK")
|
||||
def test_wpa_ssid_2g(self, get_ap_logs, update_report, get_lf_logs,
|
||||
lf_test, test_cases, station_names_twog):
|
||||
lf_test, test_cases, station_names_twog, get_ap_channel):
|
||||
"""Client Connectivity wpa ssid 2.4G
|
||||
pytest -m "client_connectivity and bridge and general and wpa and twog"
|
||||
"""
|
||||
@@ -106,19 +110,21 @@ class TestBridgeModeConnectivitySuiteA(object):
|
||||
security = "wpa"
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('wpa 5 GHZ Band')
|
||||
def test_wpa_ssid_5g(self, get_ap_logs, lf_test, update_report, get_lf_logs,
|
||||
test_cases, station_names_fiveg):
|
||||
test_cases, station_names_fiveg, get_ap_channel):
|
||||
"""Client Connectivity wpa ssid 5G
|
||||
pytest -m "client_connectivity and bridge and general and wpa and fiveg"
|
||||
"""
|
||||
@@ -128,12 +134,14 @@ class TestBridgeModeConnectivitySuiteA(object):
|
||||
security = "wpa"
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_personal
|
||||
@@ -141,7 +149,7 @@ class TestBridgeModeConnectivitySuiteA(object):
|
||||
@allure.story('wpa2_personal 2.4 GHZ Band')
|
||||
def test_wpa2_personal_ssid_2g(self, get_ap_logs, get_lf_logs,
|
||||
lf_test, update_report, test_cases,
|
||||
station_names_twog):
|
||||
station_names_twog, get_ap_channel):
|
||||
"""Client Connectivity wpa2_personal ssid 2.4G
|
||||
pytest -m "client_connectivity and bridge and general and wpa2_personal and twog"
|
||||
"""
|
||||
@@ -151,12 +159,14 @@ class TestBridgeModeConnectivitySuiteA(object):
|
||||
security = "wpa2"
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_personal
|
||||
@@ -164,7 +174,7 @@ class TestBridgeModeConnectivitySuiteA(object):
|
||||
@allure.story('wpa2_personal 5 GHZ Band')
|
||||
def test_wpa2_personal_ssid_5g(self, get_ap_logs, update_report, test_cases,
|
||||
station_names_fiveg, get_lf_logs,
|
||||
lf_test):
|
||||
lf_test, get_ap_channel):
|
||||
"""Client Connectivity wpa2_personal ssid 5G
|
||||
pytest -m "client_connectivity and bridge and general and wpa2_personal and fiveg"
|
||||
"""
|
||||
@@ -174,12 +184,14 @@ class TestBridgeModeConnectivitySuiteA(object):
|
||||
security = "wpa2"
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
|
||||
setup_params_general_two = {
|
||||
@@ -224,7 +236,7 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
@allure.story('open 2.4 GHZ Band')
|
||||
def test_wpa3_personal_ssid_2g(self, get_ap_logs, station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases):
|
||||
test_cases, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and bridge and general and wpa3_personal and twog"
|
||||
"""
|
||||
@@ -234,19 +246,21 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_personal
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('open 5 GHZ Band')
|
||||
def test_wpa3_personal_ssid_5g(self, get_ap_logs, station_names_fiveg,
|
||||
lf_test, test_cases, get_lf_logs,
|
||||
update_report):
|
||||
update_report, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and bridge and general and wpa3_personal and fiveg"
|
||||
"""
|
||||
@@ -256,10 +270,12 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
|
||||
@@ -269,7 +285,7 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
def test_wpa3_personal_mixed_ssid_2g(self, get_ap_logs, station_names_twog,
|
||||
lf_test, get_lf_logs,
|
||||
update_report,
|
||||
test_cases):
|
||||
test_cases, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and bridge and general and wpa3_personal_mixed and twog"
|
||||
"""
|
||||
@@ -279,19 +295,21 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_personal_mixed
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('open 5 GHZ Band')
|
||||
def test_wpa3_personal_mixed_ssid_5g(self, get_ap_logs, station_names_fiveg, lf_test,
|
||||
test_cases, get_lf_logs,
|
||||
update_report):
|
||||
update_report, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and bridge and general and wpa3_personal_mixed and fiveg"
|
||||
"""
|
||||
@@ -301,12 +319,14 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_wpa2_personal_mixed
|
||||
@pytest.mark.twog
|
||||
@@ -314,7 +334,7 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
def test_wpa_wpa2_personal_ssid_2g(self, get_ap_logs, station_names_twog,
|
||||
lf_test, get_lf_logs,
|
||||
update_report,
|
||||
test_cases):
|
||||
test_cases, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and bridge and general and wpa_wpa2_personal_mixed and twog"
|
||||
"""
|
||||
@@ -325,19 +345,21 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "BRIDGE"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_wpa2_personal_mixed
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('wpa wpa2 personal mixed 5 GHZ Band')
|
||||
def test_wpa_wpa2_personal_ssid_5g(self, get_ap_logs, station_names_fiveg, get_lf_logs,
|
||||
lf_test, test_cases,
|
||||
update_report):
|
||||
update_report, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and bridge and general and wpa_wpa2_personal_mixed and fiveg"
|
||||
"""
|
||||
@@ -348,11 +370,13 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "BRIDGE"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
assert result
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
assert passes == "PASS", result
|
||||
|
||||
# WEP Security Feature not available
|
||||
# setup_params_wep = {
|
||||
|
||||
@@ -2,7 +2,7 @@ import allure
|
||||
import pytest
|
||||
|
||||
pytestmark = [pytest.mark.client_connectivity,
|
||||
pytest.mark.vlan, pytest.mark.enterprise, pytest.mark.tls, pytest.mark.uc_sanity]
|
||||
pytest.mark.nat, pytest.mark.enterprise, pytest.mark.tls, pytest.mark.uc_sanity]
|
||||
|
||||
setup_params_enterprise = {
|
||||
"mode": "NAT",
|
||||
@@ -36,7 +36,7 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
@pytest.mark.twog
|
||||
def test_tls_wpa_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
@@ -47,6 +47,8 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
@@ -54,18 +56,18 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
key_mgmt=key_mgmt, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_wpa_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
@@ -76,6 +78,8 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
@@ -83,10 +87,10 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_fiveg,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
key_mgmt=key_mgmt, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
@@ -99,7 +103,7 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
|
||||
# passes))
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
|
||||
|
||||
@@ -107,7 +111,7 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
@pytest.mark.twog
|
||||
def test_tls_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
@@ -117,6 +121,8 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
security = "wpa2"
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
@@ -124,18 +130,18 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
key_mgmt=key_mgmt, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
@@ -145,6 +151,8 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
security = "wpa2"
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
@@ -152,10 +160,10 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_fiveg,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
key_mgmt=key_mgmt, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
# if passes:
|
||||
# update_report.update_testrail(case_id=test_cases["2g_wpa_NAT"],
|
||||
@@ -168,7 +176,7 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
# msg='2G WPA Client Connectivity Failed - NAT mode' + str(
|
||||
# passes))
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
|
||||
|
||||
@@ -176,7 +184,7 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
@pytest.mark.twog
|
||||
def test_tls_wpa3_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
@@ -186,6 +194,8 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
@@ -193,18 +203,18 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_twog,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
key_mgmt=key_mgmt, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_tls_wpa3_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa3 enterprise 5g
|
||||
pytest -m "client_connectivity and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
@@ -214,6 +224,8 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
@@ -221,15 +233,12 @@ class TestNATModeEnterpriseTLSSuiteOne(object):
|
||||
identity = radius_info['user']
|
||||
# pk_passwd = radcius_info['pk_password']
|
||||
# lf_tools.add_vlan(vlan)
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, eap=eap, ttls_passwd=tls_passwd,
|
||||
identity=identity, station_name=station_names_fiveg,
|
||||
key_mgmt=key_mgmt, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
|
||||
|
||||
key_mgmt=key_mgmt, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes == "PASS", result
|
||||
|
||||
setup_params_enterprise_two = {
|
||||
"mode": "NAT",
|
||||
@@ -265,7 +274,7 @@ class TestNATModeEnterpriseTLSSuiteTwo(object):
|
||||
@pytest.mark.twog
|
||||
def test_wpa_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and twog"
|
||||
"""
|
||||
@@ -275,22 +284,24 @@ class TestNATModeEnterpriseTLSSuiteTwo(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
|
||||
assert passes
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and fiveg"
|
||||
"""
|
||||
@@ -300,22 +311,24 @@ class TestNATModeEnterpriseTLSSuiteTwo(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
def test_wpa3_enterprise_mixed_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise_mixed and twog"
|
||||
"""
|
||||
@@ -324,23 +337,26 @@ class TestNATModeEnterpriseTLSSuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa3_enterprise_mixed_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
update_report, exit_on_fail,
|
||||
test_cases, radius_info):
|
||||
test_cases, radius_info, get_ap_channel):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity and bridge and enterprise and ttls and wpa3_enterprise_mixed and fiveg"
|
||||
"""
|
||||
@@ -349,14 +365,18 @@ class TestNATModeEnterpriseTLSSuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
|
||||
vlan = 1
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes == "PASS", result
|
||||
|
||||
assert passes
|
||||
|
||||
|
||||
@@ -34,132 +34,144 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_wpa_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
station_names_twog, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
station_names_fiveg, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
station_names_twog, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa2"
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
station_names_fiveg, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa2"
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_wpa3_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
station_names_twog, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa3_enterprise_5g(self, station_names_fiveg, get_ap_logs, get_lf_logs,
|
||||
setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
|
||||
setup_params_enterprise_two = {
|
||||
@@ -190,86 +202,94 @@ class TestNATModeEnterpriseTTLSSuiteTwo(object):
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
def test_wpa_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
station_names_twog, lf_test, update_report,
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
station_names_fiveg, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
def test_wpa3_enterprise_mixed_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
station_names_twog, lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa3_enterprise_mixed_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, setup_profiles, lf_test,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report, exit_on_fail,
|
||||
test_cases, radius_info):
|
||||
test_cases, radius_info, get_ap_channel):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@@ -49,9 +49,9 @@ class TestNATModeConnectivitySuiteA(object):
|
||||
@pytest.mark.twog
|
||||
@allure.story('open 2.4 GHZ Band')
|
||||
def test_open_ssid_2g(self, get_ap_logs, get_lf_logs,
|
||||
setup_profiles, lf_test, update_report,
|
||||
lf_test, update_report,
|
||||
station_names_twog,
|
||||
test_cases):
|
||||
test_cases, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and nat and general and open and twog"
|
||||
"""
|
||||
@@ -63,19 +63,21 @@ class TestNATModeConnectivitySuiteA(object):
|
||||
security = "open"
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.open
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('open 5 GHZ Band')
|
||||
def test_open_ssid_5g(self, get_ap_logs, get_lf_logs,
|
||||
lf_test, test_cases, station_names_fiveg,
|
||||
update_report):
|
||||
update_report, get_ap_channel):
|
||||
"""Client Connectivity open ssid 5G
|
||||
pytest -m "client_connectivity and NAT and general and open and fiveg"
|
||||
"""
|
||||
@@ -85,19 +87,21 @@ class TestNATModeConnectivitySuiteA(object):
|
||||
security = "open"
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa
|
||||
@pytest.mark.twog
|
||||
@allure.story('wpa 2.4 GHZ Band')
|
||||
def test_wpa_ssid_2g(self, get_ap_logs, update_report, get_lf_logs,
|
||||
lf_test, test_cases, station_names_twog):
|
||||
lf_test, test_cases, station_names_twog, get_ap_channel):
|
||||
"""Client Connectivity wpa ssid 2.4G
|
||||
pytest -m "client_connectivity and NAT and general and wpa and twog"
|
||||
"""
|
||||
@@ -107,18 +111,20 @@ class TestNATModeConnectivitySuiteA(object):
|
||||
security = "wpa"
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
assert result
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('wpa 5 GHZ Band')
|
||||
def test_wpa_ssid_5g(self, get_ap_logs, get_lf_logs,
|
||||
lf_test, update_report, test_cases, station_names_fiveg):
|
||||
lf_test, update_report, test_cases, station_names_fiveg, get_ap_channel):
|
||||
"""Client Connectivity wpa ssid 5G
|
||||
pytest -m "client_connectivity and NAT and general and wpa and fiveg"
|
||||
"""
|
||||
@@ -128,12 +134,14 @@ class TestNATModeConnectivitySuiteA(object):
|
||||
security = "wpa"
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_personal
|
||||
@@ -141,7 +149,7 @@ class TestNATModeConnectivitySuiteA(object):
|
||||
@allure.story('wpa2_personal 2.4 GHZ Band')
|
||||
def test_wpa2_personal_ssid_2g(self, get_ap_logs, get_lf_logs,
|
||||
lf_test, update_report, test_cases,
|
||||
station_names_twog):
|
||||
station_names_twog, get_ap_channel):
|
||||
"""Client Connectivity wpa2_personal ssid 2.4G
|
||||
pytest -m "client_connectivity and NAT and general and wpa2_personal and twog"
|
||||
"""
|
||||
@@ -151,12 +159,14 @@ class TestNATModeConnectivitySuiteA(object):
|
||||
security = "wpa2"
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_personal
|
||||
@@ -165,7 +175,7 @@ class TestNATModeConnectivitySuiteA(object):
|
||||
def test_wpa2_personal_ssid_5g(self, get_ap_logs, get_lf_logs,
|
||||
update_report, test_cases,
|
||||
station_names_fiveg,
|
||||
lf_test):
|
||||
lf_test, get_ap_channel):
|
||||
"""Client Connectivity wpa2_personal ssid 5G
|
||||
pytest -m "client_connectivity and NAT and general and wpa2_personal and fiveg"
|
||||
"""
|
||||
@@ -175,12 +185,14 @@ class TestNATModeConnectivitySuiteA(object):
|
||||
security = "wpa2"
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
|
||||
setup_params_general_two = {
|
||||
@@ -222,9 +234,9 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
@pytest.mark.twog
|
||||
@allure.story('open 2.4 GHZ Band')
|
||||
def test_wpa3_personal_ssid_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases):
|
||||
test_cases, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and NAT and general and wpa3_personal and twog"
|
||||
"""
|
||||
@@ -234,19 +246,21 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_personal
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('open 5 GHZ Band')
|
||||
def test_wpa3_personal_ssid_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test, test_cases,
|
||||
update_report):
|
||||
update_report, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and NAT and general and wpa3_personal and fiveg"
|
||||
"""
|
||||
@@ -256,21 +270,23 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_personal_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.story('open 2.4 GHZ Band')
|
||||
def test_wpa3_personal_mixed_ssid_2g(self, get_ap_logs,
|
||||
station_names_twog, setup_profiles,
|
||||
station_names_twog,
|
||||
lf_test, get_lf_logs,
|
||||
update_report,
|
||||
test_cases):
|
||||
test_cases, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and NAT and general and wpa3_personal_mixed and twog"
|
||||
"""
|
||||
@@ -280,12 +296,14 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_personal_mixed
|
||||
@pytest.mark.fiveg
|
||||
@@ -293,7 +311,7 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
def test_wpa3_personal_mixed_ssid_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
test_cases,
|
||||
update_report):
|
||||
update_report, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and NAT and general and wpa3_personal_mixed and fiveg"
|
||||
"""
|
||||
@@ -303,21 +321,23 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
security = "wpa3"
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_wpa2_personal_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.story('wpa wpa2 personal mixed 2.4 GHZ Band')
|
||||
def test_wpa_wpa2_personal_ssid_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles,
|
||||
station_names_twog,
|
||||
lf_test,
|
||||
update_report,
|
||||
test_cases):
|
||||
test_cases, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and NAT and general and wpa_wpa2_personal_mixed and twog"
|
||||
"""
|
||||
@@ -328,19 +348,21 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "NAT"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_wpa2_personal_mixed
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('wpa wpa2 personal mixed 5 GHZ Band')
|
||||
def test_wpa_wpa2_personal_ssid_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test, test_cases,
|
||||
update_report):
|
||||
update_report, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and NAT and general and wpa_wpa2_personal_mixed and fiveg"
|
||||
"""
|
||||
@@ -351,11 +373,13 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "NAT"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 1
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
assert result
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
assert passes == "PASS", result
|
||||
|
||||
|
||||
# WEP Security Feature not available
|
||||
|
||||
@@ -38,46 +38,50 @@ class TestVLANModeEnterpriseTLSSuiteOne(object):
|
||||
def test_wpa_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
# @pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@@ -85,22 +89,24 @@ class TestVLANModeEnterpriseTLSSuiteOne(object):
|
||||
def test_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa2"
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
# @pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@@ -108,66 +114,72 @@ class TestVLANModeEnterpriseTLSSuiteOne(object):
|
||||
def test_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa2"
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_wpa3_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa3_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
setup_params_enterprise_two = {
|
||||
"mode": "VLAN",
|
||||
@@ -200,23 +212,25 @@ class TestVLANModeEnterpriseTLSSuiteTwo(object):
|
||||
def test_wpa_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
@@ -224,23 +238,25 @@ class TestVLANModeEnterpriseTLSSuiteTwo(object):
|
||||
def test_wpa_wpa2_enterprise_5g(self, get_ap_logs,
|
||||
station_names_fiveg,
|
||||
lf_test, get_lf_logs,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
@@ -248,22 +264,24 @@ class TestVLANModeEnterpriseTLSSuiteTwo(object):
|
||||
def test_wpa3_enterprise_mixed_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog,
|
||||
lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
vlan = 100
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
@@ -272,19 +290,21 @@ class TestVLANModeEnterpriseTLSSuiteTwo(object):
|
||||
station_names_fiveg,
|
||||
lf_test,
|
||||
update_report, exit_on_fail,
|
||||
test_cases, radius_info):
|
||||
test_cases, radius_info, get_ap_channel):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
tls_passwd = radius_info["password"]
|
||||
eap = "TLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=tls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@@ -37,46 +37,50 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
def test_wpa_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@@ -84,22 +88,24 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
def test_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa2"
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@@ -107,66 +113,72 @@ class TestVLANModeEnterpriseTTLSSuiteOne(object):
|
||||
def test_wpa2_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa2"
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
def test_wpa3_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa3_enterprise_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band, ieee80211w=2, key_mgmt="WPA-EAP-SHA256",
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
|
||||
setup_params_enterprise_two = {
|
||||
@@ -200,68 +212,74 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
|
||||
def test_wpa_wpa2_enterprise_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases, radius_info, exit_on_fail):
|
||||
test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
def test_wpa_wpa2_enterprise_5g(self, get_ap_logs,
|
||||
station_names_fiveg,
|
||||
lf_test, get_lf_logs,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
def test_wpa3_enterprise_mixed_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog,
|
||||
lf_test,
|
||||
update_report, test_cases, radius_info, exit_on_fail):
|
||||
update_report, test_cases, radius_info, exit_on_fail, get_ap_channel):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
@@ -269,19 +287,21 @@ class TestVLANModeEnterpriseTTLSSuiteTwo(object):
|
||||
station_names_fiveg,
|
||||
lf_test,
|
||||
update_report, exit_on_fail,
|
||||
test_cases, radius_info):
|
||||
test_cases, radius_info, get_ap_channel):
|
||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][1]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
ttls_passwd = radius_info["password"]
|
||||
eap = "TTLS"
|
||||
identity = radius_info['user']
|
||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
passes, result = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||
mode=mode, band=band,
|
||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert passes
|
||||
assert passes == "PASS", result
|
||||
|
||||
@@ -47,9 +47,9 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
@pytest.mark.twog
|
||||
@allure.story('open 2.4 GHZ Band')
|
||||
def test_open_ssid_2g(self, get_ap_logs, get_lf_logs,
|
||||
setup_profiles, lf_test, update_report,
|
||||
lf_test, update_report,
|
||||
station_names_twog,
|
||||
test_cases):
|
||||
test_cases, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and vlan and general and open and twog"
|
||||
"""
|
||||
@@ -59,18 +59,20 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
security = "open"
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
assert result
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.open
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('open 5 GHZ Band')
|
||||
def test_open_ssid_5g(self, get_ap_logs, get_lf_logs,
|
||||
lf_test, test_cases, station_names_fiveg,
|
||||
update_report):
|
||||
update_report, get_ap_channel):
|
||||
"""Client Connectivity open ssid 5G
|
||||
pytest -m "client_connectivity and vlan and general and open and fiveg"
|
||||
"""
|
||||
@@ -80,12 +82,14 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
security = "open"
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa
|
||||
@@ -93,7 +97,7 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
@allure.story('wpa 2.4 GHZ Band')
|
||||
def test_wpa_ssid_2g(self, get_ap_logs,
|
||||
update_report, get_lf_logs,
|
||||
lf_test, test_cases, station_names_twog):
|
||||
lf_test, test_cases, station_names_twog, get_ap_channel):
|
||||
"""Client Connectivity wpa ssid 2.4G
|
||||
pytest -m "client_connectivity and vlan and general and wpa and twog"
|
||||
"""
|
||||
@@ -103,19 +107,21 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
security = "wpa"
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('wpa 5 GHZ Band')
|
||||
def test_wpa_ssid_5g(self, get_ap_logs, get_lf_logs,
|
||||
lf_test, update_report, test_cases, station_names_fiveg):
|
||||
lf_test, update_report, test_cases, station_names_fiveg, get_ap_channel):
|
||||
"""Client Connectivity wpa ssid 5G
|
||||
pytest -m "client_connectivity and vlan and general and wpa and fiveg"
|
||||
"""
|
||||
@@ -125,12 +131,14 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
security = "wpa"
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_personal
|
||||
@@ -138,7 +146,7 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
@allure.story('wpa2_personal 2.4 GHZ Band')
|
||||
def test_wpa2_personal_ssid_2g(self, get_ap_logs, get_lf_logs,
|
||||
lf_test, update_report, test_cases,
|
||||
station_names_twog):
|
||||
station_names_twog, get_ap_channel):
|
||||
"""Client Connectivity wpa2_personal ssid 2.4G
|
||||
pytest -m "client_connectivity and vlan and general and wpa2_personal and twog"
|
||||
"""
|
||||
@@ -148,12 +156,14 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
security = "wpa2"
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@pytest.mark.wpa2_personal
|
||||
@@ -162,7 +172,7 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
def test_wpa2_personal_ssid_5g(self, get_ap_logs, get_lf_logs,
|
||||
update_report, test_cases,
|
||||
station_names_fiveg,
|
||||
lf_test):
|
||||
lf_test, get_ap_channel):
|
||||
"""Client Connectivity wpa2_personal ssid 5G
|
||||
pytest -m "client_connectivity and vlan and general and wpa2_personal and fiveg"
|
||||
"""
|
||||
@@ -172,12 +182,14 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
security = "wpa2"
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
|
||||
setup_params_general_two = {
|
||||
@@ -220,9 +232,9 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
@pytest.mark.twog
|
||||
@allure.story('open 2.4 GHZ Band')
|
||||
def test_wpa3_personal_ssid_2g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_twog, setup_profiles, lf_test,
|
||||
station_names_twog, lf_test,
|
||||
update_report,
|
||||
test_cases):
|
||||
test_cases, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and vlan and general and wpa3_personal and twog"
|
||||
"""
|
||||
@@ -232,12 +244,14 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa3_personal
|
||||
@@ -245,7 +259,7 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
@allure.story('open 5 GHZ Band')
|
||||
def test_wpa3_personal_ssid_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test, test_cases,
|
||||
update_report):
|
||||
update_report, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and vlan and general and wpa3_personal and fiveg"
|
||||
"""
|
||||
@@ -255,21 +269,23 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
assert result
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa3_personal_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.story('open 2.4 GHZ Band')
|
||||
def test_wpa3_personal_mixed_ssid_2g(self, get_ap_logs,
|
||||
station_names_twog, setup_profiles,
|
||||
station_names_twog,
|
||||
lf_test, get_lf_logs,
|
||||
update_report,
|
||||
test_cases):
|
||||
test_cases, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and vlan and general and wpa3_personal_mixed and twog"
|
||||
"""
|
||||
@@ -279,11 +295,13 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
assert result
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa3_personal_mixed
|
||||
@@ -292,7 +310,7 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
def test_wpa3_personal_mixed_ssid_5g(self, get_ap_logs,
|
||||
station_names_fiveg, lf_test,
|
||||
test_cases, get_lf_logs,
|
||||
update_report):
|
||||
update_report, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and vlan and general and wpa3_personal_mixed and fiveg"
|
||||
"""
|
||||
@@ -302,21 +320,23 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
security = "wpa3"
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
assert result
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa_wpa2_personal_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.story('wpa wpa2 personal mixed 2.4 GHZ Band')
|
||||
def test_wpa_wpa2_personal_ssid_2g(self, get_ap_logs,
|
||||
station_names_twog, setup_profiles,
|
||||
station_names_twog,
|
||||
lf_test, get_lf_logs,
|
||||
update_report,
|
||||
test_cases):
|
||||
test_cases, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and vlan and general and wpa_wpa2_personal_mixed and twog"
|
||||
"""
|
||||
@@ -327,11 +347,13 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "VLAN"
|
||||
band = "twog"
|
||||
channel = get_ap_channel[0]["2G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
assert result
|
||||
station_name=station_names_twog, vlan_id=vlan, ssid_channel=channel)
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa_wpa2_personal_mixed
|
||||
@@ -339,7 +361,7 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
@allure.story('wpa wpa2 personal mixed 5 GHZ Band')
|
||||
def test_wpa_wpa2_personal_ssid_5g(self, get_ap_logs, get_lf_logs,
|
||||
station_names_fiveg, lf_test, test_cases,
|
||||
update_report):
|
||||
update_report, get_ap_channel):
|
||||
"""Client Connectivity open ssid 2.4G
|
||||
pytest -m "client_connectivity and vlan and general and wpa_wpa2_personal_mixed and fiveg"
|
||||
"""
|
||||
@@ -350,12 +372,14 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
extra_secu = ["wpa2"]
|
||||
mode = "VLAN"
|
||||
band = "fiveg"
|
||||
channel = get_ap_channel[0]["5G"]
|
||||
print("ssid channel:- ", channel)
|
||||
vlan = 100
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
station_name=station_names_fiveg, vlan_id=vlan, ssid_channel=channel)
|
||||
|
||||
assert result
|
||||
assert passes == "PASS", result
|
||||
|
||||
# WEP Security Feature not available
|
||||
# setup_params_wep = {
|
||||
|
||||
Reference in New Issue
Block a user