removed unwanted allure attach

Signed-off-by: shivamcandela <shivam.thakur@candelatech.com>
This commit is contained in:
shivamcandela
2021-08-04 20:18:45 +05:30
parent 8449e64b1a
commit 3df18d7c3b
8 changed files with 58 additions and 153 deletions

View File

@@ -20,7 +20,6 @@ import allure
class APNOS:
def __init__(self, credentials=None, pwd=os.getcwd(), sdk="2.x"):
allure.attach(name="APNOS LIbrary: ", body=str(credentials))
self.serial = credentials['serial']
self.owrt_args = "--prompt root@OpenAp -s serial --log stdout --user root --passwd openwifi"
self.sdk = sdk
@@ -55,10 +54,8 @@ class APNOS:
stdin, stdout, stderr = client.exec_command(cmd)
var = str(stdout.read())
if var.__contains__("True"):
allure.attach(name="openwrt_ctl Setup", body=str(var))
print("APNOS Serial Setup OK")
else:
allure.attach(name="openwrt_ctl Setup", body=str(var))
print("APNOS Serial Setup Fail")
# Method to connect AP-CLI/ JUMPHOST-CLI
@@ -82,7 +79,6 @@ class APNOS:
stdin, stdout, stderr = client.exec_command(cmd)
output = stdout.read()
client.close()
allure.attach(name="AP Reboot", body=str(output))
return output
# Method to get the iwinfo status of AP using AP-CLI/ JUMPHOST-CLI
@@ -96,8 +92,6 @@ class APNOS:
stdin, stdout, stderr = client.exec_command(cmd)
data = stdout.read()
client.close()
allure.attach(name="iwinfo Output Msg: ", body=str(data))
allure.attach(name="iwinfo config Err Msg: ", body=str(stderr))
data = str(data).replace(" ", "").split("\\r\\n")
band_info = []
for i in data:
@@ -130,8 +124,7 @@ class APNOS:
stdin, stdout, stderr = client.exec_command(cmd)
output = stdout.read()
client.close()
allure.attach(name="vif config Output Msg: ", body=str(output))
allure.attach(name="vif config Err Msg: ", body=str(stderr))
return output
@@ -145,8 +138,6 @@ class APNOS:
stdin, stdout, stderr = client.exec_command(cmd)
output = stdout.read()
client.close()
allure.attach(name="vif state Output Msg: ", body=str(output))
allure.attach(name="vif state Err Msg: ", body=str(stderr))
return output
# Method to get the vif_config ssid's of AP using AP-CLI/ JUMPHOST-CLI
@@ -157,7 +148,6 @@ class APNOS:
ssid = str(i).replace(" ", "").split(".")
if ssid[0].split(":")[0] == "b'ssid":
ssid_list.append(ssid[0].split(":")[1].replace("'", ""))
allure.attach(name="get_vif_config_ssids ", body=str(ssid_list))
return ssid_list
# Method to get the vif_state ssid's of AP using AP-CLI/ JUMPHOST-CLI
@@ -209,7 +199,6 @@ class APNOS:
ssid_info_list.append(info)
info = []
print(ssid_info_list)
# allure.attach(name="get_vif_state_ssids ", body=str(ssid_list))
return ssid_info_list
# Get VIF State parameters
@@ -220,7 +209,6 @@ class APNOS:
ssid = str(i).replace(" ", "").split(".")
if ssid[0].split(":")[0] == "b'ssid":
ssid_list.append(ssid[0].split(":")[1].replace("'", ""))
allure.attach(name="get_vif_state_ssids ", body=str(ssid_list))
return ssid_list
# Method to get the active firmware of AP using AP-CLI/ JUMPHOST-CLI
@@ -240,9 +228,7 @@ class APNOS:
client.close()
except Exception as e:
print(e)
allure.attach(name="get_active_firmware - Exception ", body=str(e))
cli_active_fw = "Error"
allure.attach(name="get_active_firmware ", body=str(cli_active_fw))
return cli_active_fw
# Method to get the manager state of AP using AP-CLI/ JUMPHOST-CLI
@@ -260,9 +246,7 @@ class APNOS:
client.close()
except Exception as e:
print(e)
allure.attach(name="get_active_firmware - Exception ", body=str(e))
status = "Error"
allure.attach(name="get_active_firmware ", body=str(status))
return status
def get_serial_number(self):
@@ -275,14 +259,11 @@ class APNOS:
stdin, stdout, stderr = client.exec_command(cmd)
output = stdout.read()
output = output.decode('utf-8').splitlines()
allure.attach(name="get_serial_number output ", body=str(stderr))
serial = output[1].replace(" ", "").split("|")[1]
client.close()
except Exception as e:
print(e)
allure.attach(name="get_serial_number - Exception ", body=str(e))
serial = "Error"
allure.attach(name="get_serial_number ", body=str(serial))
return serial
def get_redirector(self):
@@ -296,14 +277,11 @@ class APNOS:
output = stdout.read()
print(output, stderr.read())
status = output.decode('utf-8').splitlines()
allure.attach(name="get_redirector output ", body=str(stderr))
redirector = status[1].replace(" ", "").split("|")[1]
client.close()
except Exception as e:
print(e)
allure.attach(name="get_redirector - Exception ", body=str(e))
redirector = "Error"
allure.attach(name="get_redirector ", body=redirector)
return redirector
def run_generic_command(self, cmd=""):
@@ -317,13 +295,10 @@ class APNOS:
output = stdout.read()
print(output, stderr.read())
status = output.decode('utf-8').splitlines()
allure.attach(name="get_redirector output ", body=str(stderr))
client.close()
except Exception as e:
print(e)
allure.attach(name="get_redirector - Exception ", body=str(e))
status = "Error"
allure.attach(name="get_redirector ", body=status)
return status
def get_ucentral_status(self):
@@ -343,12 +318,9 @@ class APNOS:
latest = output.decode('utf-8').splitlines()[3].split(":")[1].replace(" ", "").replace(",", "")
active = output.decode('utf-8').splitlines()[4].split(":")[1].replace(" ", "").replace(",", "")
client.close()
allure.attach(name="ubus call ucentral status ", body=str(connected) + "\n" + latest + "\n" + active)
except Exception as e:
print(e)
allure.attach(name="Exception ", body=str(e))
connected, latest, active = "Error", "Error", "Error"
allure.attach(name="ubus call ucentral status ", body=str(connected) + "\n" + latest + "\n" + active)
return connected, latest, active
def get_uc_latest_config(self):
@@ -512,8 +484,6 @@ class APNOS:
stdin, stdout, stderr = client.exec_command(cmd)
output = stdout.read()
client.close()
allure.attach(name="vif state Output Msg: ", body=str(output))
allure.attach(name="vif state Err Msg: ", body=str(stderr))
return output
def get_vifs(self):
@@ -525,8 +495,6 @@ class APNOS:
stdin, stdout, stderr = client.exec_command(cmd)
output = stdout.read()
client.close()
allure.attach(name="vif state Output Msg: ", body=str(output))
allure.attach(name="vif state Err Msg: ", body=str(stderr))
return output
def get_vlan(self):
@@ -556,5 +524,5 @@ if __name__ == '__main__':
'version': "https://tip.jfrog.io/artifactory/tip-wlan-ap-firmware/uCentral/edgecore_eap102/20210625-edgecore_eap102-uCentral-trunk-4225122-upgrade.bin"
}
var = APNOS(credentials=obj, sdk="2.x")
x = var.get_interface_details()
x = var.get_ap_version_ucentral()
print(x)

View File

@@ -16,6 +16,7 @@ from pathlib import Path
from requests.adapters import HTTPAdapter
import logging
# logging.basicConfig(level=logging.DEBUG)
# from http.client import HTTPConnection
#
@@ -141,7 +142,7 @@ class UProfileUtility:
"interfaces": [{
"name": "WAN",
"role": "upstream",
"services": ["lldp"],
"services": ["lldp", "dhcp-snooping"],
"ethernet": [
{
"select-ports": [
@@ -156,7 +157,7 @@ class UProfileUtility:
{
"name": "LAN",
"role": "downstream",
"services": ["ssh", "lldp"],
"services": ["ssh", "lldp", "dhcp-snooping"],
"ethernet": [
{
"select-ports": [
@@ -176,17 +177,32 @@ class UProfileUtility:
}],
"metrics": {
"statistics": {
"interval": 120,
"interval": 60,
"types": ["ssids", "lldp", "clients"]
},
"health": {
"interval": 120
},
"wifi-frames": {
"filters": ["probe",
"auth",
"assoc",
"disassoc",
"deauth",
"local-deauth",
"inactive-deauth",
"key-mismatch",
"beacon-report",
"radar-detected"]
},
"dhcp-snooping": {
"filters": ["ack", "discover", "offer", "request", "solicit", "reply", "renew"]
}
},
"services": {
"lldp": {
"describe": "uCentral",
"location": "universe"
"describe": "TIP OpenWiFi",
"location": "QA"
},
"ssh": {
"port": 22
@@ -265,14 +281,14 @@ class UProfileUtility:
def add_ssid(self, ssid_data, radius=False, radius_auth_data={}, radius_accounting_data={}):
print("ssid data : ", ssid_data)
ssid_info = {'name': ssid_data["ssid_name"], "bss-mode": "ap", "wifi-bands": []}
ssid_info = {'name': ssid_data["ssid_name"], "bss-mode": "ap", "wifi-bands": [], "services": ["wifi-frames"]}
for i in ssid_data["appliedRadios"]:
ssid_info["wifi-bands"].append(i)
ssid_info['encryption'] = {}
ssid_info['encryption']['proto'] = ssid_data["security"]
try:
ssid_info['encryption']['key'] = ssid_data["security_key"]
except:
except Exception as e:
pass
ssid_info['encryption']['ieee80211w'] = "optional"
if radius:
@@ -296,6 +312,7 @@ class UProfileUtility:
self.vlan_section = {
"name": "WAN100",
"role": "upstream",
"services": ["lldp", "dhcp-snooping"],
"vlan": {
"id": 100
},
@@ -331,12 +348,12 @@ class UProfileUtility:
pytest.exit("invalid Operating Mode")
def push_config(self, serial_number):
payload = {"configuration": self.base_profile_config, 'serialNumber': serial_number, 'UUID': 0}
payload = {"configuration": self.base_profile_config, "serialNumber": serial_number, "UUID": 0}
uri = self.sdk_client.build_uri("device/" + serial_number + "/configure")
basic_cfg_str = json.dumps(payload)
allure.attach(name="ucentral_config: ", body=str(self.base_profile_config))
# print(self.base_profile_config)
# allure.attach(name="ucentral_config: ", body=str(self.base_profile_config))
print(self.base_profile_config)
resp = requests.post(uri, data=basic_cfg_str, headers=self.sdk_client.make_headers(),
verify=False, timeout=100)
self.sdk_client.check_response("POST", resp, self.sdk_client.make_headers(), basic_cfg_str, uri)
@@ -346,19 +363,18 @@ class UProfileUtility:
if __name__ == '__main__':
controller = {
'url': 'https://sec-ucentral-qa01.cicd.lab.wlan.tip.build:16001', # API base url for the controller
'username': "tip@ucentral.com",
'password': 'openwifi',
'url': 'https://sec-ucentral-qa01.cicd.lab.wlan.tip.build:16001', # API base url for the controller
'username': "tip@ucentral.com",
'password': 'openwifi',
}
obj = UController(controller_data=controller)
profile = UProfileUtility(sdk_client=obj)
profile.set_mode(mode="VLAN")
profile.set_mode(mode="BRIDGE")
profile.set_radio_config()
ssid = {"ssid_name": "ssid_wpa2_2g_nat", "appliedRadios": ["2G"], "security": "psk", "security_key": "something", "vlan": 100}
ssid = {"ssid_name": "ssid_wpa2_2g", "appliedRadios": ["2G"], "security": "psk", "security_key": "something",
"vlan": 100}
profile.add_ssid(ssid_data=ssid)
# profile.push_config(serial_number="903cb39d6918")
profile.push_config(serial_number="903cb39d6918")
# print(obj.get_devices())
obj.logout()

View File

@@ -31,7 +31,8 @@ ubuntu@3.130.51.163
"""
Customer = ""
server = ""
CONFIGURATION = {
"basic-01": {
"controller": {
@@ -139,8 +140,8 @@ CONFIGURATION = {
"ip": "10.28.3.10",
"port": 8080,
"ssh_port": 22,
"2.4G-Radio": ["1.1.wiphy0", "1.1.wiphy4"],
"5G-Radio": ["1.1.wiphy1", "1.1.wiphy5"],
"2.4G-Radio": ["1.1.wiphy4"],
"5G-Radio": ["1.1.wiphy5"],
"AX-Radio": ["1.1.wiphy0", "1.1.wiphy1", "1.1.wiphy2", "1.1.wiphy3"],
"upstream": "1.1.eth2",
"upstream_subnet": "10.28.2.1/24",
@@ -167,7 +168,7 @@ CONFIGURATION = {
'username': "lanforge",
'password': "pumpkin77",
'port': 22,
'jumphost_tty': '/dev/ttyAP5',
'jumphost_tty': "/dev/ttyAP5",
'version': "https://tip.jfrog.io/artifactory/tip-wlan-ap-firmware/uCentral/edgecore_eap102/20210625-edgecore_eap102-uCentral-trunk-4225122-upgrade.bin"
}
],

View File

@@ -177,8 +177,6 @@ def test_cases():
def testbed(request):
"""yields the testbed option selection"""
var = request.config.getoption("--testbed")
allure.attach(body=str(var),
name="Testbed Selected : ")
yield var
@@ -217,7 +215,6 @@ def radius_accounting_info():
@pytest.fixture(scope="session")
def get_configuration(testbed, request):
"""yields the selected testbed information from lab info file (configuration.py)"""
allure.attach(body=str(testbed), name="Testbed Selected: ")
if request.config.getini("cloud_ctlr") != "0":
CONFIGURATION[testbed]["controller"]["url"] = request.config.getini("cloud_ctlr")
yield CONFIGURATION[testbed]
@@ -249,12 +246,9 @@ def instantiate_access_point(testbed, get_apnos, get_configuration):
"""setup the access point connectivity"""
for access_point_info in get_configuration['access_point']:
if access_point_info["jumphost"]:
allure.attach(name="added openwrtctl.py to :",
body=access_point_info['ip'] + ":" + str(access_point_info["port"]))
get_apnos(access_point_info, pwd="../libs/apnos/")
else:
allure.attach(name="Direct AP SSH : ",
body=access_point_info['ip'] + ":" + str(access_point_info["port"]))
pass
# Write a code to verify Access Point Connectivity
yield True
@@ -266,23 +260,20 @@ def setup_controller(request, get_configuration, test_access_point, add_env_prop
try:
if request.config.getoption("1.x"):
sdk_client = Controller(controller_data=get_configuration["controller"])
allure.attach(body=str(get_configuration["controller"]), name="Controller Instantiated: ")
def teardown_controller():
print("\nTest session Completed")
allure.attach(body=str(get_configuration["controller"]), name="Controller Teardown: ")
sdk_client.disconnect_Controller()
request.addfinalizer(teardown_controller)
else:
sdk_client = UController(controller_data=get_configuration["controller"])
allure.attach(body=str(get_configuration["controller"]), name="Ucentral Controller Instantiated: ")
def teardown_ucontroller():
print("\nTest session Completed")
sdk_client.logout()
allure.attach(body=str(get_configuration["controller"]), name="Controller Teardown: ")
try:
sdk_client.logout()
except Exception as e:
@@ -379,7 +370,6 @@ def upgrade_firmware(request, instantiate_firmware, get_equipment_id, check_ap_f
for i in range(0, len(instantiate_firmware)):
status = instantiate_firmware[i].upgrade_fw(equipment_id=get_equipment_id[i], force_upload=True,
force_upgrade=should_upgrade_firmware)
allure.attach(name="Firmware Upgrade Request", body=str(status))
status_list.append(status)
else:
if should_upgrade_firmware:
@@ -387,7 +377,6 @@ def upgrade_firmware(request, instantiate_firmware, get_equipment_id, check_ap_f
status = instantiate_firmware[i].upgrade_fw(equipment_id=get_equipment_id[i],
force_upload=should_upload_firmware,
force_upgrade=should_upgrade_firmware)
allure.attach(name="Firmware Upgrade Request", body=str(status))
status_list.append(status)
else:
status = "skip-upgrade Version Already Available"

View File

@@ -591,7 +591,6 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
profile_data = {}
if parameter['mode'] not in ["BRIDGE", "NAT", "VLAN"]:
print("Invalid Mode: ", parameter['mode'])
allure.attach(body=parameter['mode'], name="Invalid Mode: ")
yield test_cases
instantiate_profile_obj.set_radio_config()
if parameter['mode'] == "NAT":
@@ -626,13 +625,9 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
j['security'] = 'none'
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
test_cases["wpa_2g"] = True
allure.attach(body=str(creates_profile),
name="SSID Profile Created")
except Exception as e:
print(e)
test_cases["wpa_2g"] = False
allure.attach(body=str(e),
name="SSID Profile Creation Failed")
if mode == "wpa":
for j in profile_data["ssid"][mode]:
if mode in get_markers.keys() and get_markers[mode]:
@@ -645,13 +640,9 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
j['security'] = 'psk'
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
test_cases["wpa_2g"] = True
allure.attach(body=str(creates_profile),
name="SSID Profile Created")
except Exception as e:
print(e)
test_cases["wpa_2g"] = False
allure.attach(body=str(e),
name="SSID Profile Creation Failed")
if mode == "wpa2_personal":
for j in profile_data["ssid"][mode]:
if mode in get_markers.keys() and get_markers[mode]:
@@ -664,13 +655,9 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
j['security'] = 'psk2'
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
test_cases["wpa_2g"] = True
allure.attach(body=str(creates_profile),
name="SSID Profile Created")
except Exception as e:
print(e)
test_cases["wpa2_personal"] = False
allure.attach(body=str(e),
name="SSID Profile Creation Failed")
if mode == "wpa_wpa2_personal_mixed":
for j in profile_data["ssid"][mode]:
if mode in get_markers.keys() and get_markers[mode]:
@@ -683,13 +670,9 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
j['security'] = 'psk-mixed'
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
test_cases["wpa_2g"] = True
allure.attach(body=str(creates_profile),
name="SSID Profile Created")
except Exception as e:
print(e)
test_cases["wpa2_personal"] = False
allure.attach(body=str(e),
name="SSID Profile Creation Failed")
if mode == "wpa3_personal":
for j in profile_data["ssid"][mode]:
if mode in get_markers.keys() and get_markers[mode]:
@@ -702,13 +685,9 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
j['security'] = 'sae'
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
test_cases["wpa_2g"] = True
allure.attach(body=str(creates_profile),
name="SSID Profile Created")
except Exception as e:
print(e)
test_cases["wpa2_personal"] = False
allure.attach(body=str(e),
name="SSID Profile Creation Failed")
if mode == "wpa3_personal_mixed":
for j in profile_data["ssid"][mode]:
if mode in get_markers.keys() and get_markers[mode]:
@@ -721,13 +700,9 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
j['security'] = 'sae-mixed'
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
test_cases["wpa_2g"] = True
allure.attach(body=str(creates_profile),
name="SSID Profile Created")
except Exception as e:
print(e)
test_cases["wpa2_personal"] = False
allure.attach(body=str(e),
name="SSID Profile Creation Failed")
# EAP SSID Modes
if mode == "wpa2_enterprise":
@@ -746,18 +721,13 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
radius_auth_data=RADIUS_SERVER_DATA,
radius_accounting_data=RADIUS_ACCOUNTING_DATA)
test_cases["wpa_2g"] = True
allure.attach(body=str(creates_profile),
name="SSID Profile Created")
except Exception as e:
print(e)
test_cases["wpa2_personal"] = False
allure.attach(body=str(e),
name="SSID Profile Creation Failed")
ap_ssh = get_apnos(get_configuration['access_point'][0], pwd="../libs/apnos/", sdk="2.x")
connected, latest, active = ap_ssh.get_ucentral_status()
print(2, instantiate_profile_obj.sdk_client)
if connected == False:
pytest.exit("AP is disconnected")
pytest.exit("AP is disconnected from UC Gateway")
instantiate_profile_obj.push_config(serial_number=get_equipment_id[0])
config = json.loads(str(instantiate_profile_obj.base_profile_config).replace(" ", "").replace("'", '"'))
config["uuid"] = 0
@@ -773,6 +743,8 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
x += 1
ap_config_latest = ap_ssh.get_uc_latest_config()
ap_config_latest["uuid"] = 0
print("latest config: ", ap_config_latest)
print("config: ", config)
if x == 19:
break
if x < 19:
@@ -787,11 +759,11 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
time.sleep(5)
x += 1
ap_config_latest = ap_ssh.get_uc_latest_config()
print(ap_config_latest)
ap_config_latest["uuid"] = 0
ap_config_active = ap_ssh.get_uc_active_config()
print(ap_config_active)
print("latest config: ", ap_config_latest)
print("Active config: ", ap_config_active)
ap_config_active["uuid"] = 0
if x == 19:
break
@@ -956,7 +928,6 @@ def get_vif_state(get_apnos, get_configuration, request, lf_tools):
ap_ssh = get_apnos(get_configuration['access_point'][0], pwd="../libs/apnos/")
vif_state = list(ap_ssh.get_vif_state_ssids())
vif_state.sort()
allure.attach(name="vif_state", body=str(vif_state))
yield vif_state
else:
yield lf_tools.ssid_list
@@ -967,5 +938,4 @@ def get_vlan_list(get_apnos, get_configuration):
ap_ssh = get_apnos(get_configuration['access_point'][0], pwd="../libs/apnos/")
vlan_list = list(ap_ssh.get_vlan())
vlan_list.sort()
allure.attach(name="vlan_list", body=str(vlan_list))
yield vlan_list

View File

@@ -14,9 +14,9 @@ pytestmark = [pytest.mark.client_connectivity, pytest.mark.bridge, pytest.mark.g
setup_params_general = {
"mode": "BRIDGE",
"ssid_modes": {
"open": [{"ssid_name": "ssid_open_2g_br", "appliedRadios": ["2G"], "security_key": "something" },
"open": [{"ssid_name": "ssid_open_2g_br", "appliedRadios": ["2G"], "security_key": "something"},
{"ssid_name": "ssid_open_5g_br", "appliedRadios": ["5G"],
"security_key": "something" }],
"security_key": "something"}],
"wpa": [{"ssid_name": "ssid_wpa_2g_br", "appliedRadios": ["2G"], "security_key": "something"},
{"ssid_name": "ssid_wpa_5g_br", "appliedRadios": ["5G"],
"security_key": "something"}],
@@ -119,8 +119,7 @@ class TestBridgeModeConnectivitySuiteA(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
passkey=security_key, mode=mode, band=band,
station_name=station_names_twog, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.sanity_light
@@ -146,8 +145,7 @@ class TestBridgeModeConnectivitySuiteA(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
passkey=security_key, mode=mode, band=band,
station_name=station_names_fiveg, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.sanity_light
@@ -239,7 +237,6 @@ class TestBridgeModeConnectivitySuiteTwo(object):
pytest -m "client_connectivity and bridge and suiteB"
"""
@pytest.mark.wpa3_personal
@pytest.mark.twog
@allure.story('open 2.4 GHZ Band')
@@ -293,7 +290,6 @@ class TestBridgeModeConnectivitySuiteTwo(object):
assert result
@pytest.mark.uc_sanity
@pytest.mark.wpa3_personal_mixed
@pytest.mark.twog
@allure.story('open 2.4 GHZ Band')
@@ -321,7 +317,6 @@ class TestBridgeModeConnectivitySuiteTwo(object):
assert result
@pytest.mark.uc_sanity
@pytest.mark.wpa3_personal_mixed
@pytest.mark.fiveg
@allure.story('open 5 GHZ Band')
@@ -348,7 +343,6 @@ class TestBridgeModeConnectivitySuiteTwo(object):
assert result
@pytest.mark.uc_sanity
@pytest.mark.wpa_wpa2_personal_mixed
@pytest.mark.twog
@allure.story('wpa wpa2 personal mixed 2.4 GHZ Band')
@@ -377,7 +371,6 @@ class TestBridgeModeConnectivitySuiteTwo(object):
assert result
@pytest.mark.uc_sanity
@pytest.mark.wpa_wpa2_personal_mixed
@pytest.mark.fiveg
@allure.story('wpa wpa2 personal mixed 5 GHZ Band')

View File

@@ -241,7 +241,6 @@ class TestNATModeConnectivitySuiteB(object):
pytest -m "client_connectivity and NAT and suiteB"
"""
@pytest.mark.uc_sanity
@pytest.mark.wpa3_personal
@pytest.mark.twog
@allure.story('open 2.4 GHZ Band')
@@ -265,11 +264,9 @@ class TestNATModeConnectivitySuiteB(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
passkey=security_key, mode=mode, band=band,
station_name=station_names_twog, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.uc_sanity
@pytest.mark.wpa3_personal
@pytest.mark.fiveg
@allure.story('open 5 GHZ Band')
@@ -292,11 +289,9 @@ class TestNATModeConnectivitySuiteB(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
passkey=security_key, mode=mode, band=band,
station_name=station_names_fiveg, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.uc_sanity
@pytest.mark.wpa3_personal_mixed
@pytest.mark.twog
@allure.story('open 2.4 GHZ Band')
@@ -321,11 +316,9 @@ class TestNATModeConnectivitySuiteB(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
passkey=security_key, mode=mode, band=band,
station_name=station_names_twog, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.uc_sanity
@pytest.mark.wpa3_personal_mixed
@pytest.mark.fiveg
@allure.story('open 5 GHZ Band')
@@ -349,11 +342,9 @@ class TestNATModeConnectivitySuiteB(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
passkey=security_key, mode=mode, band=band,
station_name=station_names_fiveg, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.uc_sanity
@pytest.mark.wpa_wpa2_personal_mixed
@pytest.mark.twog
@allure.story('wpa wpa2 personal mixed 2.4 GHZ Band')
@@ -379,11 +370,9 @@ class TestNATModeConnectivitySuiteB(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security, extra_securities=extra_secu,
passkey=security_key, mode=mode, band=band,
station_name=station_names_twog, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.uc_sanity
@pytest.mark.wpa_wpa2_personal_mixed
@pytest.mark.fiveg
@allure.story('wpa wpa2 personal mixed 5 GHZ Band')
@@ -407,8 +396,6 @@ class TestNATModeConnectivitySuiteB(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security, extra_securities=extra_secu,
passkey=security_key, mode=mode, band=band,
station_name=station_names_fiveg, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
# WEP Security Feature not available

View File

@@ -66,8 +66,6 @@ class TestvlanModeConnectivitySuiteA(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
passkey=security_key, mode=mode, band=band,
station_name=station_names_twog, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.open
@@ -93,8 +91,6 @@ class TestvlanModeConnectivitySuiteA(object):
passkey=security_key, mode=mode, band=band,
station_name=station_names_fiveg, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.sanity_light
@@ -121,8 +117,6 @@ class TestvlanModeConnectivitySuiteA(object):
passkey=security_key, mode=mode, band=band,
station_name=station_names_twog, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.sanity_light
@@ -149,8 +143,6 @@ class TestvlanModeConnectivitySuiteA(object):
passkey=security_key, mode=mode, band=band,
station_name=station_names_fiveg, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.sanity_light
@@ -266,8 +258,7 @@ class TestvlanModeConnectivitySuiteTwo(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
passkey=security_key, mode=mode, band=band,
station_name=station_names_twog, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.uc_sanity
@@ -293,8 +284,6 @@ class TestvlanModeConnectivitySuiteTwo(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
passkey=security_key, mode=mode, band=band,
station_name=station_names_fiveg, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.uc_sanity
@@ -322,8 +311,6 @@ class TestvlanModeConnectivitySuiteTwo(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
passkey=security_key, mode=mode, band=band,
station_name=station_names_twog, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.uc_sanity
@@ -350,8 +337,6 @@ class TestvlanModeConnectivitySuiteTwo(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
passkey=security_key, mode=mode, band=band,
station_name=station_names_fiveg, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.uc_sanity
@@ -380,8 +365,6 @@ class TestvlanModeConnectivitySuiteTwo(object):
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security, extra_securities=extra_secu,
passkey=security_key, mode=mode, band=band,
station_name=station_names_twog, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
@pytest.mark.uc_sanity
@@ -409,8 +392,6 @@ class TestvlanModeConnectivitySuiteTwo(object):
passkey=security_key, mode=mode, band=band,
station_name=station_names_fiveg, vlan_id=vlan)
if not result:
pytest.xfail("ssid issue")
assert result
# WEP Security Feature not available