diff --git a/tests/e2e/basic/conftest.py b/tests/e2e/basic/conftest.py index d64d7081d..d6a599ca9 100644 --- a/tests/e2e/basic/conftest.py +++ b/tests/e2e/basic/conftest.py @@ -81,6 +81,7 @@ def setup_profiles(request, setup_controller, testbed, get_equipment_id, fixture get_markers, create_lanforge_chamberview_dut, lf_tools, get_security_flags, get_configuration, radius_info, get_apnos, radius_accounting_info) + yield return_var diff --git a/tests/fixtures_2x.py b/tests/fixtures_2x.py index 4ba16c4eb..ee2f9f8c8 100644 --- a/tests/fixtures_2x.py +++ b/tests/fixtures_2x.py @@ -65,338 +65,342 @@ class Fixtures_2x: def setup_profiles(self, request, param, setup_controller, testbed, get_equipment_id, instantiate_profile, get_markers, create_lanforge_chamberview_dut, lf_tools, get_security_flags, get_configuration, radius_info, get_apnos, radius_accounting_info): - print("inside conftest_2x") - if not request.config.getoption("1.x"): - instantiate_profile_obj = instantiate_profile(sdk_client=setup_controller) - print("garbage") - print(1, instantiate_profile_obj.sdk_client) - vlan_id, mode = 0, 0 - parameter = dict(param) - print("hola", parameter) - test_cases = {} - profile_data = {} - if parameter['mode'] not in ["BRIDGE", "NAT", "VLAN"]: - print("Invalid Mode: ", parameter['mode']) - return test_cases + instantiate_profile_obj = instantiate_profile(sdk_client=setup_controller) + print("garbage") + print(1, instantiate_profile_obj.sdk_client) + vlan_id, mode = 0, 0 + parameter = dict(param) + print("hola", parameter) + test_cases = {} + profile_data = {} - instantiate_profile_obj.set_radio_config() + if parameter['mode'] not in ["BRIDGE", "NAT", "VLAN"]: + print("Invalid Mode: ", parameter['mode']) + return test_cases - if parameter['mode'] == "NAT": - mode = "NAT" - instantiate_profile_obj.set_mode(mode=mode) - vlan_id = 1 - if parameter['mode'] == "BRIDGE": - mode = "BRIDGE" - instantiate_profile_obj.set_mode(mode=mode) - vlan_id = 1 - if parameter['mode'] == "VLAN": - mode = "VLAN" - instantiate_profile_obj.set_mode(mode=mode) - profile_data["ssid"] = {} + instantiate_profile_obj.set_radio_config() - for i in parameter["ssid_modes"]: - profile_data["ssid"][i] = [] - for j in range(len(parameter["ssid_modes"][i])): - data = parameter["ssid_modes"][i][j] - profile_data["ssid"][i].append(data) - lf_dut_data = [] - for mode in profile_data['ssid']: - if mode == "open": - for j in profile_data["ssid"][mode]: - if mode in get_markers.keys() and get_markers[mode]: - try: - if j["appliedRadios"].__contains__("2G"): - lf_dut_data.append(j) - if j["appliedRadios"].__contains__("5G"): - lf_dut_data.append(j) - j["appliedRadios"] = list(set(j["appliedRadios"])) - j['security'] = 'none' - creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j) - test_cases["wpa_2g"] = True - except Exception as e: - print(e) - test_cases["wpa_2g"] = False - if mode == "wpa": - for j in profile_data["ssid"][mode]: - if mode in get_markers.keys() and get_markers[mode]: - try: - if j["appliedRadios"].__contains__("2G"): - lf_dut_data.append(j) - if j["appliedRadios"].__contains__("5G"): - lf_dut_data.append(j) - j["appliedRadios"] = list(set(j["appliedRadios"])) - j['security'] = 'psk' - creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j) - test_cases["wpa_2g"] = True - except Exception as e: - print(e) - test_cases["wpa_2g"] = False - if mode == "wpa2_personal": - for j in profile_data["ssid"][mode]: - if mode in get_markers.keys() and get_markers[mode]: - try: - if j["appliedRadios"].__contains__("2G"): - lf_dut_data.append(j) - if j["appliedRadios"].__contains__("5G"): - lf_dut_data.append(j) - j["appliedRadios"] = list(set(j["appliedRadios"])) - j['security'] = 'psk2' - creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j) - test_cases["wpa_2g"] = True - except Exception as e: - print(e) - test_cases["wpa2_personal"] = False - if mode == "wpa_wpa2_personal_mixed": - for j in profile_data["ssid"][mode]: - if mode in get_markers.keys() and get_markers[mode]: - try: - if j["appliedRadios"].__contains__("2G"): - lf_dut_data.append(j) - if j["appliedRadios"].__contains__("5G"): - lf_dut_data.append(j) - j["appliedRadios"] = list(set(j["appliedRadios"])) - j['security'] = 'psk-mixed' - creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j) - test_cases["wpa_2g"] = True - except Exception as e: - print(e) - test_cases["wpa2_personal"] = False - if mode == "wpa3_personal": - for j in profile_data["ssid"][mode]: - if mode in get_markers.keys() and get_markers[mode]: - try: - if j["appliedRadios"].__contains__("2G"): - lf_dut_data.append(j) - if j["appliedRadios"].__contains__("5G"): - lf_dut_data.append(j) - j["appliedRadios"] = list(set(j["appliedRadios"])) - j['security'] = 'sae' - creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j) - test_cases["wpa_2g"] = True - except Exception as e: - print(e) - test_cases["wpa2_personal"] = False - if mode == "wpa3_personal_mixed": - for j in profile_data["ssid"][mode]: - if mode in get_markers.keys() and get_markers[mode]: - try: - if j["appliedRadios"].__contains__("2G"): - lf_dut_data.append(j) - if j["appliedRadios"].__contains__("5G"): - lf_dut_data.append(j) - j["appliedRadios"] = list(set(j["appliedRadios"])) - j['security'] = 'sae-mixed' - creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j) - test_cases["wpa_2g"] = True - except Exception as e: - print(e) - test_cases["wpa2_personal"] = False - # EAP SSID Modes - if mode == "wpa2_enterprise": - for j in profile_data["ssid"][mode]: - if mode in get_markers.keys() and get_markers[mode]: - try: - if j["appliedRadios"].__contains__("2G"): - lf_dut_data.append(j) - if j["appliedRadios"].__contains__("5G"): - lf_dut_data.append(j) - j["appliedRadios"] = list(set(j["appliedRadios"])) - j['security'] = 'wpa2' - RADIUS_SERVER_DATA = radius_info - RADIUS_ACCOUNTING_DATA = radius_accounting_info - creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j, radius=True, - radius_auth_data=RADIUS_SERVER_DATA, - radius_accounting_data=RADIUS_ACCOUNTING_DATA) - test_cases["wpa_2g"] = True - except Exception as e: - print(e) - test_cases["wpa2_personal"] = False - ap_ssh = get_apnos(get_configuration['access_point'][0], pwd="../libs/apnos/", sdk="2.x") + if parameter['mode'] == "NAT": + mode = "NAT" + instantiate_profile_obj.set_mode(mode=mode) + vlan_id = 1 + if parameter['mode'] == "BRIDGE": + mode = "BRIDGE" + instantiate_profile_obj.set_mode(mode=mode) + vlan_id = 1 + if parameter['mode'] == "VLAN": + mode = "VLAN" + instantiate_profile_obj.set_mode(mode=mode) + profile_data["ssid"] = {} + + for i in parameter["ssid_modes"]: + profile_data["ssid"][i] = [] + for j in range(len(parameter["ssid_modes"][i])): + data = parameter["ssid_modes"][i][j] + profile_data["ssid"][i].append(data) + lf_dut_data = [] + for mode in profile_data['ssid']: + if mode == "open": + for j in profile_data["ssid"][mode]: + if mode in get_markers.keys() and get_markers[mode]: + try: + if j["appliedRadios"].__contains__("2G"): + lf_dut_data.append(j) + if j["appliedRadios"].__contains__("5G"): + lf_dut_data.append(j) + j["appliedRadios"] = list(set(j["appliedRadios"])) + j['security'] = 'none' + creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j) + test_cases["wpa_2g"] = True + except Exception as e: + print(e) + test_cases["wpa_2g"] = False + if mode == "wpa": + for j in profile_data["ssid"][mode]: + if mode in get_markers.keys() and get_markers[mode]: + try: + if j["appliedRadios"].__contains__("2G"): + lf_dut_data.append(j) + if j["appliedRadios"].__contains__("5G"): + lf_dut_data.append(j) + j["appliedRadios"] = list(set(j["appliedRadios"])) + j['security'] = 'psk' + creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j) + test_cases["wpa_2g"] = True + except Exception as e: + print(e) + test_cases["wpa_2g"] = False + if mode == "wpa2_personal": + for j in profile_data["ssid"][mode]: + if mode in get_markers.keys() and get_markers[mode]: + try: + if j["appliedRadios"].__contains__("2G"): + lf_dut_data.append(j) + if j["appliedRadios"].__contains__("5G"): + lf_dut_data.append(j) + j["appliedRadios"] = list(set(j["appliedRadios"])) + j['security'] = 'psk2' + creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j) + test_cases["wpa_2g"] = True + except Exception as e: + print(e) + test_cases["wpa2_personal"] = False + if mode == "wpa_wpa2_personal_mixed": + for j in profile_data["ssid"][mode]: + if mode in get_markers.keys() and get_markers[mode]: + try: + if j["appliedRadios"].__contains__("2G"): + lf_dut_data.append(j) + if j["appliedRadios"].__contains__("5G"): + lf_dut_data.append(j) + j["appliedRadios"] = list(set(j["appliedRadios"])) + j['security'] = 'psk-mixed' + creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j) + test_cases["wpa_2g"] = True + except Exception as e: + print(e) + test_cases["wpa2_personal"] = False + if mode == "wpa3_personal": + for j in profile_data["ssid"][mode]: + if mode in get_markers.keys() and get_markers[mode]: + try: + if j["appliedRadios"].__contains__("2G"): + lf_dut_data.append(j) + if j["appliedRadios"].__contains__("5G"): + lf_dut_data.append(j) + j["appliedRadios"] = list(set(j["appliedRadios"])) + j['security'] = 'sae' + creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j) + test_cases["wpa_2g"] = True + except Exception as e: + print(e) + test_cases["wpa2_personal"] = False + if mode == "wpa3_personal_mixed": + for j in profile_data["ssid"][mode]: + if mode in get_markers.keys() and get_markers[mode]: + try: + if j["appliedRadios"].__contains__("2G"): + lf_dut_data.append(j) + if j["appliedRadios"].__contains__("5G"): + lf_dut_data.append(j) + j["appliedRadios"] = list(set(j["appliedRadios"])) + j['security'] = 'sae-mixed' + creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j) + test_cases["wpa_2g"] = True + except Exception as e: + print(e) + test_cases["wpa2_personal"] = False + # EAP SSID Modes + if mode == "wpa2_enterprise": + for j in profile_data["ssid"][mode]: + if mode in get_markers.keys() and get_markers[mode]: + try: + if j["appliedRadios"].__contains__("2G"): + lf_dut_data.append(j) + if j["appliedRadios"].__contains__("5G"): + lf_dut_data.append(j) + j["appliedRadios"] = list(set(j["appliedRadios"])) + j['security'] = 'wpa2' + RADIUS_SERVER_DATA = radius_info + RADIUS_ACCOUNTING_DATA = radius_accounting_info + creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j, radius=True, + radius_auth_data=RADIUS_SERVER_DATA, + radius_accounting_data=RADIUS_ACCOUNTING_DATA) + test_cases["wpa_2g"] = True + except Exception as e: + print(e) + test_cases["wpa2_personal"] = False + ap_ssh = get_apnos(get_configuration['access_point'][0], pwd="../libs/apnos/", sdk="2.x") + connected, latest, active = ap_ssh.get_ucentral_status() + if connected == False: + pytest.exit("AP is disconnected from UC Gateway") + if latest != active: + allure.attach(name="FAIL : ubus call ucentral status: ", + body="connected: " + str(connected) + "\nlatest: " + str(latest) + "\nactive: " + str(active)) + ap_logs = ap_ssh.logread() + allure.attach(body=ap_logs, name="FAILURE: AP LOgs: ") + pytest.fail("AP is disconnected from UC Gateway") + instantiate_profile_obj.push_config(serial_number=get_equipment_id[0]) + time_1 = time.time() + config = json.loads(str(instantiate_profile_obj.base_profile_config).replace(" ", "").replace("'", '"')) + config["uuid"] = 0 + ap_config_latest = ap_ssh.get_uc_latest_config() + try: + ap_config_latest["uuid"] = 0 + except Exception as e: + print(e) + pass + x = 1 + old_config = latest + connected, latest, active = ap_ssh.get_ucentral_status() + while old_config == latest: + time.sleep(5) + x += 1 + print("old config: ", old_config) + print("latest: ", latest) connected, latest, active = ap_ssh.get_ucentral_status() - if connected == False: - pytest.exit("AP is disconnected from UC Gateway") - if latest != active: - allure.attach(name="FAIL : ubus call ucentral status: ", - body="connected: " + str(connected) + "\nlatest: " + str(latest) + "\nactive: " + str(active)) - ap_logs = ap_ssh.logread() - allure.attach(body=ap_logs, name="FAILURE: AP LOgs: ") - pytest.fail("AP is disconnected from UC Gateway") - instantiate_profile_obj.push_config(serial_number=get_equipment_id[0]) - time_1 = time.time() - config = json.loads(str(instantiate_profile_obj.base_profile_config).replace(" ", "").replace("'", '"')) - config["uuid"] = 0 - ap_config_latest = ap_ssh.get_uc_latest_config() - try: - ap_config_latest["uuid"] = 0 - except Exception as e: - print(e) - pass - x = 1 - old_config = latest + if x == 19: + break + connected, latest, active = ap_ssh.get_ucentral_status() + x = 1 + while active != latest: connected, latest, active = ap_ssh.get_ucentral_status() - while old_config == latest: - time.sleep(5) - x += 1 - print("old config: " , old_config) - print("latest: " , latest) - connected, latest, active = ap_ssh.get_ucentral_status() - if x == 19: - break - connected, latest, active = ap_ssh.get_ucentral_status() - x = 1 - while active != latest: - connected, latest, active = ap_ssh.get_ucentral_status() - time.sleep(10) - x += 1 - print("active: ", active) - print("latest: ", latest) - if x == 19: - break - if x < 19: - print("Config properly applied into AP", config) + time.sleep(10) + x += 1 + print("active: ", active) + print("latest: ", latest) + if x == 19: + break + if x < 19: + print("Config properly applied into AP", config) - time_2 = time.time() - time_interval = time_2 - time_1 - allure.attach(name="Time Took to apply Config: " + str(time_interval), body="") + time_2 = time.time() + time_interval = time_2 - time_1 + allure.attach(name="Time Took to apply Config: " + str(time_interval), body="") + ap_config_latest = ap_ssh.get_uc_latest_config() + ap_config_latest["uuid"] = 0 + + ap_config_active = ap_ssh.get_uc_active_config() + ap_config_active["uuid"] = 0 + x = 1 + + while ap_config_active != ap_config_latest: + time.sleep(5) + x += 1 ap_config_latest = ap_ssh.get_uc_latest_config() ap_config_latest["uuid"] = 0 ap_config_active = ap_ssh.get_uc_active_config() + print("latest config: ", ap_config_latest) + print("Active config: ", ap_config_active) ap_config_active["uuid"] = 0 - x = 1 + if x == 19: + break + if x < 19: + print("AP is Broadcasting Applied Config") + allure.attach(name="Success : Active Config in AP: ", body=str(ap_config_active)) - while ap_config_active != ap_config_latest: - time.sleep(5) - x += 1 - ap_config_latest = ap_ssh.get_uc_latest_config() - ap_config_latest["uuid"] = 0 - - ap_config_active = ap_ssh.get_uc_active_config() - print("latest config: ", ap_config_latest) - print("Active config: ", ap_config_active) - ap_config_active["uuid"] = 0 - if x == 19: - break - if x < 19: - print("AP is Broadcasting Applied Config") - allure.attach(name="Success : Active Config in AP: ", body=str(ap_config_active)) - - else: - print("AP is Not Broadcasting Applied Config") - allure.attach(name="Failed to Apply Config : Active Config in AP : ", body=str(ap_config_active)) - - ap_logs = ap_ssh.logread() - allure.attach(body=ap_logs, name="AP LOgs: ") - ap_wifi_data = ap_ssh.get_interface_details() - idx_mapping = {} - ssid_data = [] - ap_interfaces = list(ap_wifi_data.keys()) - for interface in range(len(ap_interfaces)): - if ap_wifi_data[ap_interfaces[interface]][1] == "none": - ssid = ["ssid_idx=" + str(interface) + - " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + - " security=OPEN" + - " bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0] - ] - idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], - ap_wifi_data[ap_interfaces[interface]][2], - ap_wifi_data[ap_interfaces[interface]][1], - ap_wifi_data[ap_interfaces[interface]][3][1], - ap_wifi_data[ap_interfaces[interface]][3][0] - ] - # pass - if ap_wifi_data[ap_interfaces[interface]][1] == "psk": - ssid = ["ssid_idx=" + str(interface) + - " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + - " security=WPA" + - " password=" + ap_wifi_data[ap_interfaces[interface]][2] + - " bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0] - ] - idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], - ap_wifi_data[ap_interfaces[interface]][2], - ap_wifi_data[ap_interfaces[interface]][1], - ap_wifi_data[ap_interfaces[interface]][3][1], - ap_wifi_data[ap_interfaces[interface]][3][0] - ] - # pass - if ap_wifi_data[ap_interfaces[interface]][1] == "psk-mixed": - ssid = ["ssid_idx=" + str(interface) + - " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + - " security=WPA|WPA2" + - " password=" + ap_wifi_data[ap_interfaces[interface]][2] + - " bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0] - ] - idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], - ap_wifi_data[ap_interfaces[interface]][2], - ap_wifi_data[ap_interfaces[interface]][1], - ap_wifi_data[ap_interfaces[interface]][3][1], - ap_wifi_data[ap_interfaces[interface]][3][0] - ] - # pass - if ap_wifi_data[ap_interfaces[interface]][1] == "psk2": - ssid = ["ssid_idx=" + str(interface) + - " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + - " security=WPA2" + - " password=" + ap_wifi_data[ap_interfaces[interface]][2] + - " bssid=" + str(ap_wifi_data[ap_interfaces[interface]][3][0]).lower() - ] - print(ssid) - idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], - ap_wifi_data[ap_interfaces[interface]][2], - ap_wifi_data[ap_interfaces[interface]][1], - ap_wifi_data[ap_interfaces[interface]][3][1], - ap_wifi_data[ap_interfaces[interface]][3][0] - ] - # pass - if ap_wifi_data[ap_interfaces[interface]][1] == "sae": - ssid = ["ssid_idx=" + str(interface) + - " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + - " security=WPA3" + - " password=" + ap_wifi_data[ap_interfaces[interface]][2] + - " bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0] - ] - idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], - ap_wifi_data[ap_interfaces[interface]][2], - ap_wifi_data[ap_interfaces[interface]][1], - ap_wifi_data[ap_interfaces[interface]][3][1], - ap_wifi_data[ap_interfaces[interface]][3][0] - ] - # pass - if ap_wifi_data[ap_interfaces[interface]][1] == "sae-mixed": - ssid = ["ssid_idx=" + str(interface) + - " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + - " security=WPA3" + - " password=" + ap_wifi_data[ap_interfaces[interface]][2] + - " bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0] - ] - idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], - ap_wifi_data[ap_interfaces[interface]][2], - ap_wifi_data[ap_interfaces[interface]][1], - ap_wifi_data[ap_interfaces[interface]][3][1], - ap_wifi_data[ap_interfaces[interface]][3][0] - ] - # pass - if ap_wifi_data[ap_interfaces[interface]][1] == "wpa2": - ssid = ["ssid_idx=" + str(interface) + - " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + - " security=EAP-TTLS" + - " bssid=" + str(ap_wifi_data[ap_interfaces[interface]][3][0]).lower() - ] - - idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], - ap_wifi_data[ap_interfaces[interface]][2], - ap_wifi_data[ap_interfaces[interface]][1], - ap_wifi_data[ap_interfaces[interface]][3][1], - ap_wifi_data[ap_interfaces[interface]][3][0] - ] - # pass - ssid_data.append(ssid) - lf_tools.ssid_list.append(ap_wifi_data[ap_interfaces[interface]][0]) - lf_tools.dut_idx_mapping = idx_mapping - print(ssid_data) - lf_tools.update_ssid(ssid_data=ssid_data) - return test_cases else: - return False + print("AP is Not Broadcasting Applied Config") + allure.attach(name="Failed to Apply Config : Active Config in AP : ", body=str(ap_config_active)) + + ap_logs = ap_ssh.logread() + allure.attach(body=ap_logs, name="AP LOgs: ") + ap_wifi_data = ap_ssh.get_interface_details() + idx_mapping = {} + ssid_data = [] + ap_interfaces = list(ap_wifi_data.keys()) + for interface in range(len(ap_interfaces)): + if ap_wifi_data[ap_interfaces[interface]][1] == "none": + ssid = ["ssid_idx=" + str(interface) + + " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + + " security=OPEN" + + " bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0] + ] + idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], + ap_wifi_data[ap_interfaces[interface]][2], + ap_wifi_data[ap_interfaces[interface]][1], + ap_wifi_data[ap_interfaces[interface]][3][1], + ap_wifi_data[ap_interfaces[interface]][3][0] + ] + # pass + if ap_wifi_data[ap_interfaces[interface]][1] == "psk": + ssid = ["ssid_idx=" + str(interface) + + " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + + " security=WPA" + + " password=" + ap_wifi_data[ap_interfaces[interface]][2] + + " bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0] + ] + idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], + ap_wifi_data[ap_interfaces[interface]][2], + ap_wifi_data[ap_interfaces[interface]][1], + ap_wifi_data[ap_interfaces[interface]][3][1], + ap_wifi_data[ap_interfaces[interface]][3][0] + ] + # pass + if ap_wifi_data[ap_interfaces[interface]][1] == "psk-mixed": + ssid = ["ssid_idx=" + str(interface) + + " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + + " security=WPA|WPA2" + + " password=" + ap_wifi_data[ap_interfaces[interface]][2] + + " bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0] + ] + idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], + ap_wifi_data[ap_interfaces[interface]][2], + ap_wifi_data[ap_interfaces[interface]][1], + ap_wifi_data[ap_interfaces[interface]][3][1], + ap_wifi_data[ap_interfaces[interface]][3][0] + ] + # pass + if ap_wifi_data[ap_interfaces[interface]][1] == "psk2": + ssid = ["ssid_idx=" + str(interface) + + " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + + " security=WPA2" + + " password=" + ap_wifi_data[ap_interfaces[interface]][2] + + " bssid=" + str(ap_wifi_data[ap_interfaces[interface]][3][0]).lower() + ] + print(ssid) + idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], + ap_wifi_data[ap_interfaces[interface]][2], + ap_wifi_data[ap_interfaces[interface]][1], + ap_wifi_data[ap_interfaces[interface]][3][1], + ap_wifi_data[ap_interfaces[interface]][3][0] + ] + # pass + if ap_wifi_data[ap_interfaces[interface]][1] == "sae": + ssid = ["ssid_idx=" + str(interface) + + " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + + " security=WPA3" + + " password=" + ap_wifi_data[ap_interfaces[interface]][2] + + " bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0] + ] + idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], + ap_wifi_data[ap_interfaces[interface]][2], + ap_wifi_data[ap_interfaces[interface]][1], + ap_wifi_data[ap_interfaces[interface]][3][1], + ap_wifi_data[ap_interfaces[interface]][3][0] + ] + # pass + if ap_wifi_data[ap_interfaces[interface]][1] == "sae-mixed": + ssid = ["ssid_idx=" + str(interface) + + " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + + " security=WPA3" + + " password=" + ap_wifi_data[ap_interfaces[interface]][2] + + " bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0] + ] + idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], + ap_wifi_data[ap_interfaces[interface]][2], + ap_wifi_data[ap_interfaces[interface]][1], + ap_wifi_data[ap_interfaces[interface]][3][1], + ap_wifi_data[ap_interfaces[interface]][3][0] + ] + # pass + if ap_wifi_data[ap_interfaces[interface]][1] == "wpa2": + ssid = ["ssid_idx=" + str(interface) + + " ssid=" + ap_wifi_data[ap_interfaces[interface]][0] + + " security=EAP-TTLS" + + " bssid=" + str(ap_wifi_data[ap_interfaces[interface]][3][0]).lower() + ] + + idx_mapping[str(interface)] = [ap_wifi_data[ap_interfaces[interface]][0], + ap_wifi_data[ap_interfaces[interface]][2], + ap_wifi_data[ap_interfaces[interface]][1], + ap_wifi_data[ap_interfaces[interface]][3][1], + ap_wifi_data[ap_interfaces[interface]][3][0] + ] + # pass + ssid_data.append(ssid) + lf_tools.ssid_list.append(ap_wifi_data[ap_interfaces[interface]][0]) + lf_tools.dut_idx_mapping = idx_mapping + print(ssid_data) + lf_tools.update_ssid(ssid_data=ssid_data) + + def teardown_session(): + ap_logs = ap_ssh.logread() + allure.attach(body=ap_logs, name="AP Logs after test completion") + print("\nTeardown") + + request.addfinalizer(teardown_session) + return test_cases