mirror of
https://github.com/Telecominfraproject/wlan-testing.git
synced 2025-11-02 20:07:57 +00:00
removed unwanted allure attach
Signed-off-by: shivamcandela <shivam.thakur@candelatech.com>
This commit is contained in:
@@ -20,7 +20,6 @@ import allure
|
||||
class APNOS:
|
||||
|
||||
def __init__(self, credentials=None, pwd=os.getcwd(), sdk="2.x"):
|
||||
allure.attach(name="APNOS LIbrary: ", body=str(credentials))
|
||||
self.serial = credentials['serial']
|
||||
self.owrt_args = "--prompt root@OpenAp -s serial --log stdout --user root --passwd openwifi"
|
||||
self.sdk = sdk
|
||||
@@ -55,10 +54,8 @@ class APNOS:
|
||||
stdin, stdout, stderr = client.exec_command(cmd)
|
||||
var = str(stdout.read())
|
||||
if var.__contains__("True"):
|
||||
allure.attach(name="openwrt_ctl Setup", body=str(var))
|
||||
print("APNOS Serial Setup OK")
|
||||
else:
|
||||
allure.attach(name="openwrt_ctl Setup", body=str(var))
|
||||
print("APNOS Serial Setup Fail")
|
||||
|
||||
# Method to connect AP-CLI/ JUMPHOST-CLI
|
||||
@@ -82,7 +79,6 @@ class APNOS:
|
||||
stdin, stdout, stderr = client.exec_command(cmd)
|
||||
output = stdout.read()
|
||||
client.close()
|
||||
allure.attach(name="AP Reboot", body=str(output))
|
||||
return output
|
||||
|
||||
# Method to get the iwinfo status of AP using AP-CLI/ JUMPHOST-CLI
|
||||
@@ -96,8 +92,6 @@ class APNOS:
|
||||
stdin, stdout, stderr = client.exec_command(cmd)
|
||||
data = stdout.read()
|
||||
client.close()
|
||||
allure.attach(name="iwinfo Output Msg: ", body=str(data))
|
||||
allure.attach(name="iwinfo config Err Msg: ", body=str(stderr))
|
||||
data = str(data).replace(" ", "").split("\\r\\n")
|
||||
band_info = []
|
||||
for i in data:
|
||||
@@ -130,8 +124,7 @@ class APNOS:
|
||||
stdin, stdout, stderr = client.exec_command(cmd)
|
||||
output = stdout.read()
|
||||
client.close()
|
||||
allure.attach(name="vif config Output Msg: ", body=str(output))
|
||||
allure.attach(name="vif config Err Msg: ", body=str(stderr))
|
||||
|
||||
|
||||
return output
|
||||
|
||||
@@ -145,8 +138,6 @@ class APNOS:
|
||||
stdin, stdout, stderr = client.exec_command(cmd)
|
||||
output = stdout.read()
|
||||
client.close()
|
||||
allure.attach(name="vif state Output Msg: ", body=str(output))
|
||||
allure.attach(name="vif state Err Msg: ", body=str(stderr))
|
||||
return output
|
||||
|
||||
# Method to get the vif_config ssid's of AP using AP-CLI/ JUMPHOST-CLI
|
||||
@@ -157,7 +148,6 @@ class APNOS:
|
||||
ssid = str(i).replace(" ", "").split(".")
|
||||
if ssid[0].split(":")[0] == "b'ssid":
|
||||
ssid_list.append(ssid[0].split(":")[1].replace("'", ""))
|
||||
allure.attach(name="get_vif_config_ssids ", body=str(ssid_list))
|
||||
return ssid_list
|
||||
|
||||
# Method to get the vif_state ssid's of AP using AP-CLI/ JUMPHOST-CLI
|
||||
@@ -209,7 +199,6 @@ class APNOS:
|
||||
ssid_info_list.append(info)
|
||||
info = []
|
||||
print(ssid_info_list)
|
||||
# allure.attach(name="get_vif_state_ssids ", body=str(ssid_list))
|
||||
return ssid_info_list
|
||||
|
||||
# Get VIF State parameters
|
||||
@@ -220,7 +209,6 @@ class APNOS:
|
||||
ssid = str(i).replace(" ", "").split(".")
|
||||
if ssid[0].split(":")[0] == "b'ssid":
|
||||
ssid_list.append(ssid[0].split(":")[1].replace("'", ""))
|
||||
allure.attach(name="get_vif_state_ssids ", body=str(ssid_list))
|
||||
return ssid_list
|
||||
|
||||
# Method to get the active firmware of AP using AP-CLI/ JUMPHOST-CLI
|
||||
@@ -240,9 +228,7 @@ class APNOS:
|
||||
client.close()
|
||||
except Exception as e:
|
||||
print(e)
|
||||
allure.attach(name="get_active_firmware - Exception ", body=str(e))
|
||||
cli_active_fw = "Error"
|
||||
allure.attach(name="get_active_firmware ", body=str(cli_active_fw))
|
||||
return cli_active_fw
|
||||
|
||||
# Method to get the manager state of AP using AP-CLI/ JUMPHOST-CLI
|
||||
@@ -260,9 +246,7 @@ class APNOS:
|
||||
client.close()
|
||||
except Exception as e:
|
||||
print(e)
|
||||
allure.attach(name="get_active_firmware - Exception ", body=str(e))
|
||||
status = "Error"
|
||||
allure.attach(name="get_active_firmware ", body=str(status))
|
||||
return status
|
||||
|
||||
def get_serial_number(self):
|
||||
@@ -275,14 +259,11 @@ class APNOS:
|
||||
stdin, stdout, stderr = client.exec_command(cmd)
|
||||
output = stdout.read()
|
||||
output = output.decode('utf-8').splitlines()
|
||||
allure.attach(name="get_serial_number output ", body=str(stderr))
|
||||
serial = output[1].replace(" ", "").split("|")[1]
|
||||
client.close()
|
||||
except Exception as e:
|
||||
print(e)
|
||||
allure.attach(name="get_serial_number - Exception ", body=str(e))
|
||||
serial = "Error"
|
||||
allure.attach(name="get_serial_number ", body=str(serial))
|
||||
return serial
|
||||
|
||||
def get_redirector(self):
|
||||
@@ -296,14 +277,11 @@ class APNOS:
|
||||
output = stdout.read()
|
||||
print(output, stderr.read())
|
||||
status = output.decode('utf-8').splitlines()
|
||||
allure.attach(name="get_redirector output ", body=str(stderr))
|
||||
redirector = status[1].replace(" ", "").split("|")[1]
|
||||
client.close()
|
||||
except Exception as e:
|
||||
print(e)
|
||||
allure.attach(name="get_redirector - Exception ", body=str(e))
|
||||
redirector = "Error"
|
||||
allure.attach(name="get_redirector ", body=redirector)
|
||||
return redirector
|
||||
|
||||
def run_generic_command(self, cmd=""):
|
||||
@@ -317,13 +295,10 @@ class APNOS:
|
||||
output = stdout.read()
|
||||
print(output, stderr.read())
|
||||
status = output.decode('utf-8').splitlines()
|
||||
allure.attach(name="get_redirector output ", body=str(stderr))
|
||||
client.close()
|
||||
except Exception as e:
|
||||
print(e)
|
||||
allure.attach(name="get_redirector - Exception ", body=str(e))
|
||||
status = "Error"
|
||||
allure.attach(name="get_redirector ", body=status)
|
||||
return status
|
||||
|
||||
def get_ucentral_status(self):
|
||||
@@ -343,12 +318,9 @@ class APNOS:
|
||||
latest = output.decode('utf-8').splitlines()[3].split(":")[1].replace(" ", "").replace(",", "")
|
||||
active = output.decode('utf-8').splitlines()[4].split(":")[1].replace(" ", "").replace(",", "")
|
||||
client.close()
|
||||
allure.attach(name="ubus call ucentral status ", body=str(connected) + "\n" + latest + "\n" + active)
|
||||
except Exception as e:
|
||||
print(e)
|
||||
allure.attach(name="Exception ", body=str(e))
|
||||
connected, latest, active = "Error", "Error", "Error"
|
||||
allure.attach(name="ubus call ucentral status ", body=str(connected) + "\n" + latest + "\n" + active)
|
||||
return connected, latest, active
|
||||
|
||||
def get_uc_latest_config(self):
|
||||
@@ -512,8 +484,6 @@ class APNOS:
|
||||
stdin, stdout, stderr = client.exec_command(cmd)
|
||||
output = stdout.read()
|
||||
client.close()
|
||||
allure.attach(name="vif state Output Msg: ", body=str(output))
|
||||
allure.attach(name="vif state Err Msg: ", body=str(stderr))
|
||||
return output
|
||||
|
||||
def get_vifs(self):
|
||||
@@ -525,8 +495,6 @@ class APNOS:
|
||||
stdin, stdout, stderr = client.exec_command(cmd)
|
||||
output = stdout.read()
|
||||
client.close()
|
||||
allure.attach(name="vif state Output Msg: ", body=str(output))
|
||||
allure.attach(name="vif state Err Msg: ", body=str(stderr))
|
||||
return output
|
||||
|
||||
def get_vlan(self):
|
||||
@@ -556,5 +524,5 @@ if __name__ == '__main__':
|
||||
'version': "https://tip.jfrog.io/artifactory/tip-wlan-ap-firmware/uCentral/edgecore_eap102/20210625-edgecore_eap102-uCentral-trunk-4225122-upgrade.bin"
|
||||
}
|
||||
var = APNOS(credentials=obj, sdk="2.x")
|
||||
x = var.get_interface_details()
|
||||
x = var.get_ap_version_ucentral()
|
||||
print(x)
|
||||
|
||||
@@ -16,6 +16,7 @@ from pathlib import Path
|
||||
from requests.adapters import HTTPAdapter
|
||||
import logging
|
||||
|
||||
|
||||
# logging.basicConfig(level=logging.DEBUG)
|
||||
# from http.client import HTTPConnection
|
||||
#
|
||||
@@ -141,7 +142,7 @@ class UProfileUtility:
|
||||
"interfaces": [{
|
||||
"name": "WAN",
|
||||
"role": "upstream",
|
||||
"services": ["lldp"],
|
||||
"services": ["lldp", "dhcp-snooping"],
|
||||
"ethernet": [
|
||||
{
|
||||
"select-ports": [
|
||||
@@ -156,7 +157,7 @@ class UProfileUtility:
|
||||
{
|
||||
"name": "LAN",
|
||||
"role": "downstream",
|
||||
"services": ["ssh", "lldp"],
|
||||
"services": ["ssh", "lldp", "dhcp-snooping"],
|
||||
"ethernet": [
|
||||
{
|
||||
"select-ports": [
|
||||
@@ -176,17 +177,32 @@ class UProfileUtility:
|
||||
}],
|
||||
"metrics": {
|
||||
"statistics": {
|
||||
"interval": 120,
|
||||
"interval": 60,
|
||||
"types": ["ssids", "lldp", "clients"]
|
||||
},
|
||||
"health": {
|
||||
"interval": 120
|
||||
},
|
||||
"wifi-frames": {
|
||||
"filters": ["probe",
|
||||
"auth",
|
||||
"assoc",
|
||||
"disassoc",
|
||||
"deauth",
|
||||
"local-deauth",
|
||||
"inactive-deauth",
|
||||
"key-mismatch",
|
||||
"beacon-report",
|
||||
"radar-detected"]
|
||||
},
|
||||
"dhcp-snooping": {
|
||||
"filters": ["ack", "discover", "offer", "request", "solicit", "reply", "renew"]
|
||||
}
|
||||
},
|
||||
"services": {
|
||||
"lldp": {
|
||||
"describe": "uCentral",
|
||||
"location": "universe"
|
||||
"describe": "TIP OpenWiFi",
|
||||
"location": "QA"
|
||||
},
|
||||
"ssh": {
|
||||
"port": 22
|
||||
@@ -265,14 +281,14 @@ class UProfileUtility:
|
||||
|
||||
def add_ssid(self, ssid_data, radius=False, radius_auth_data={}, radius_accounting_data={}):
|
||||
print("ssid data : ", ssid_data)
|
||||
ssid_info = {'name': ssid_data["ssid_name"], "bss-mode": "ap", "wifi-bands": []}
|
||||
ssid_info = {'name': ssid_data["ssid_name"], "bss-mode": "ap", "wifi-bands": [], "services": ["wifi-frames"]}
|
||||
for i in ssid_data["appliedRadios"]:
|
||||
ssid_info["wifi-bands"].append(i)
|
||||
ssid_info['encryption'] = {}
|
||||
ssid_info['encryption']['proto'] = ssid_data["security"]
|
||||
try:
|
||||
ssid_info['encryption']['key'] = ssid_data["security_key"]
|
||||
except:
|
||||
except Exception as e:
|
||||
pass
|
||||
ssid_info['encryption']['ieee80211w'] = "optional"
|
||||
if radius:
|
||||
@@ -296,6 +312,7 @@ class UProfileUtility:
|
||||
self.vlan_section = {
|
||||
"name": "WAN100",
|
||||
"role": "upstream",
|
||||
"services": ["lldp", "dhcp-snooping"],
|
||||
"vlan": {
|
||||
"id": 100
|
||||
},
|
||||
@@ -331,12 +348,12 @@ class UProfileUtility:
|
||||
pytest.exit("invalid Operating Mode")
|
||||
|
||||
def push_config(self, serial_number):
|
||||
payload = {"configuration": self.base_profile_config, 'serialNumber': serial_number, 'UUID': 0}
|
||||
payload = {"configuration": self.base_profile_config, "serialNumber": serial_number, "UUID": 0}
|
||||
|
||||
uri = self.sdk_client.build_uri("device/" + serial_number + "/configure")
|
||||
basic_cfg_str = json.dumps(payload)
|
||||
allure.attach(name="ucentral_config: ", body=str(self.base_profile_config))
|
||||
# print(self.base_profile_config)
|
||||
# allure.attach(name="ucentral_config: ", body=str(self.base_profile_config))
|
||||
print(self.base_profile_config)
|
||||
resp = requests.post(uri, data=basic_cfg_str, headers=self.sdk_client.make_headers(),
|
||||
verify=False, timeout=100)
|
||||
self.sdk_client.check_response("POST", resp, self.sdk_client.make_headers(), basic_cfg_str, uri)
|
||||
@@ -346,8 +363,6 @@ class UProfileUtility:
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
|
||||
|
||||
controller = {
|
||||
'url': 'https://sec-ucentral-qa01.cicd.lab.wlan.tip.build:16001', # API base url for the controller
|
||||
'username': "tip@ucentral.com",
|
||||
@@ -355,10 +370,11 @@ if __name__ == '__main__':
|
||||
}
|
||||
obj = UController(controller_data=controller)
|
||||
profile = UProfileUtility(sdk_client=obj)
|
||||
profile.set_mode(mode="VLAN")
|
||||
profile.set_mode(mode="BRIDGE")
|
||||
profile.set_radio_config()
|
||||
ssid = {"ssid_name": "ssid_wpa2_2g_nat", "appliedRadios": ["2G"], "security": "psk", "security_key": "something", "vlan": 100}
|
||||
ssid = {"ssid_name": "ssid_wpa2_2g", "appliedRadios": ["2G"], "security": "psk", "security_key": "something",
|
||||
"vlan": 100}
|
||||
profile.add_ssid(ssid_data=ssid)
|
||||
# profile.push_config(serial_number="903cb39d6918")
|
||||
profile.push_config(serial_number="903cb39d6918")
|
||||
# print(obj.get_devices())
|
||||
obj.logout()
|
||||
|
||||
@@ -31,7 +31,8 @@ ubuntu@3.130.51.163
|
||||
|
||||
"""
|
||||
|
||||
|
||||
Customer = ""
|
||||
server = ""
|
||||
CONFIGURATION = {
|
||||
"basic-01": {
|
||||
"controller": {
|
||||
@@ -139,8 +140,8 @@ CONFIGURATION = {
|
||||
"ip": "10.28.3.10",
|
||||
"port": 8080,
|
||||
"ssh_port": 22,
|
||||
"2.4G-Radio": ["1.1.wiphy0", "1.1.wiphy4"],
|
||||
"5G-Radio": ["1.1.wiphy1", "1.1.wiphy5"],
|
||||
"2.4G-Radio": ["1.1.wiphy4"],
|
||||
"5G-Radio": ["1.1.wiphy5"],
|
||||
"AX-Radio": ["1.1.wiphy0", "1.1.wiphy1", "1.1.wiphy2", "1.1.wiphy3"],
|
||||
"upstream": "1.1.eth2",
|
||||
"upstream_subnet": "10.28.2.1/24",
|
||||
@@ -167,7 +168,7 @@ CONFIGURATION = {
|
||||
'username': "lanforge",
|
||||
'password': "pumpkin77",
|
||||
'port': 22,
|
||||
'jumphost_tty': '/dev/ttyAP5',
|
||||
'jumphost_tty': "/dev/ttyAP5",
|
||||
'version': "https://tip.jfrog.io/artifactory/tip-wlan-ap-firmware/uCentral/edgecore_eap102/20210625-edgecore_eap102-uCentral-trunk-4225122-upgrade.bin"
|
||||
}
|
||||
],
|
||||
|
||||
@@ -177,8 +177,6 @@ def test_cases():
|
||||
def testbed(request):
|
||||
"""yields the testbed option selection"""
|
||||
var = request.config.getoption("--testbed")
|
||||
allure.attach(body=str(var),
|
||||
name="Testbed Selected : ")
|
||||
yield var
|
||||
|
||||
|
||||
@@ -217,7 +215,6 @@ def radius_accounting_info():
|
||||
@pytest.fixture(scope="session")
|
||||
def get_configuration(testbed, request):
|
||||
"""yields the selected testbed information from lab info file (configuration.py)"""
|
||||
allure.attach(body=str(testbed), name="Testbed Selected: ")
|
||||
if request.config.getini("cloud_ctlr") != "0":
|
||||
CONFIGURATION[testbed]["controller"]["url"] = request.config.getini("cloud_ctlr")
|
||||
yield CONFIGURATION[testbed]
|
||||
@@ -249,12 +246,9 @@ def instantiate_access_point(testbed, get_apnos, get_configuration):
|
||||
"""setup the access point connectivity"""
|
||||
for access_point_info in get_configuration['access_point']:
|
||||
if access_point_info["jumphost"]:
|
||||
allure.attach(name="added openwrtctl.py to :",
|
||||
body=access_point_info['ip'] + ":" + str(access_point_info["port"]))
|
||||
get_apnos(access_point_info, pwd="../libs/apnos/")
|
||||
else:
|
||||
allure.attach(name="Direct AP SSH : ",
|
||||
body=access_point_info['ip'] + ":" + str(access_point_info["port"]))
|
||||
pass
|
||||
# Write a code to verify Access Point Connectivity
|
||||
yield True
|
||||
|
||||
@@ -266,23 +260,20 @@ def setup_controller(request, get_configuration, test_access_point, add_env_prop
|
||||
try:
|
||||
if request.config.getoption("1.x"):
|
||||
sdk_client = Controller(controller_data=get_configuration["controller"])
|
||||
allure.attach(body=str(get_configuration["controller"]), name="Controller Instantiated: ")
|
||||
|
||||
def teardown_controller():
|
||||
print("\nTest session Completed")
|
||||
allure.attach(body=str(get_configuration["controller"]), name="Controller Teardown: ")
|
||||
sdk_client.disconnect_Controller()
|
||||
|
||||
request.addfinalizer(teardown_controller)
|
||||
|
||||
else:
|
||||
sdk_client = UController(controller_data=get_configuration["controller"])
|
||||
allure.attach(body=str(get_configuration["controller"]), name="Ucentral Controller Instantiated: ")
|
||||
|
||||
|
||||
def teardown_ucontroller():
|
||||
print("\nTest session Completed")
|
||||
sdk_client.logout()
|
||||
allure.attach(body=str(get_configuration["controller"]), name="Controller Teardown: ")
|
||||
try:
|
||||
sdk_client.logout()
|
||||
except Exception as e:
|
||||
@@ -379,7 +370,6 @@ def upgrade_firmware(request, instantiate_firmware, get_equipment_id, check_ap_f
|
||||
for i in range(0, len(instantiate_firmware)):
|
||||
status = instantiate_firmware[i].upgrade_fw(equipment_id=get_equipment_id[i], force_upload=True,
|
||||
force_upgrade=should_upgrade_firmware)
|
||||
allure.attach(name="Firmware Upgrade Request", body=str(status))
|
||||
status_list.append(status)
|
||||
else:
|
||||
if should_upgrade_firmware:
|
||||
@@ -387,7 +377,6 @@ def upgrade_firmware(request, instantiate_firmware, get_equipment_id, check_ap_f
|
||||
status = instantiate_firmware[i].upgrade_fw(equipment_id=get_equipment_id[i],
|
||||
force_upload=should_upload_firmware,
|
||||
force_upgrade=should_upgrade_firmware)
|
||||
allure.attach(name="Firmware Upgrade Request", body=str(status))
|
||||
status_list.append(status)
|
||||
else:
|
||||
status = "skip-upgrade Version Already Available"
|
||||
|
||||
@@ -591,7 +591,6 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
|
||||
profile_data = {}
|
||||
if parameter['mode'] not in ["BRIDGE", "NAT", "VLAN"]:
|
||||
print("Invalid Mode: ", parameter['mode'])
|
||||
allure.attach(body=parameter['mode'], name="Invalid Mode: ")
|
||||
yield test_cases
|
||||
instantiate_profile_obj.set_radio_config()
|
||||
if parameter['mode'] == "NAT":
|
||||
@@ -626,13 +625,9 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
|
||||
j['security'] = 'none'
|
||||
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
|
||||
test_cases["wpa_2g"] = True
|
||||
allure.attach(body=str(creates_profile),
|
||||
name="SSID Profile Created")
|
||||
except Exception as e:
|
||||
print(e)
|
||||
test_cases["wpa_2g"] = False
|
||||
allure.attach(body=str(e),
|
||||
name="SSID Profile Creation Failed")
|
||||
if mode == "wpa":
|
||||
for j in profile_data["ssid"][mode]:
|
||||
if mode in get_markers.keys() and get_markers[mode]:
|
||||
@@ -645,13 +640,9 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
|
||||
j['security'] = 'psk'
|
||||
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
|
||||
test_cases["wpa_2g"] = True
|
||||
allure.attach(body=str(creates_profile),
|
||||
name="SSID Profile Created")
|
||||
except Exception as e:
|
||||
print(e)
|
||||
test_cases["wpa_2g"] = False
|
||||
allure.attach(body=str(e),
|
||||
name="SSID Profile Creation Failed")
|
||||
if mode == "wpa2_personal":
|
||||
for j in profile_data["ssid"][mode]:
|
||||
if mode in get_markers.keys() and get_markers[mode]:
|
||||
@@ -664,13 +655,9 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
|
||||
j['security'] = 'psk2'
|
||||
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
|
||||
test_cases["wpa_2g"] = True
|
||||
allure.attach(body=str(creates_profile),
|
||||
name="SSID Profile Created")
|
||||
except Exception as e:
|
||||
print(e)
|
||||
test_cases["wpa2_personal"] = False
|
||||
allure.attach(body=str(e),
|
||||
name="SSID Profile Creation Failed")
|
||||
if mode == "wpa_wpa2_personal_mixed":
|
||||
for j in profile_data["ssid"][mode]:
|
||||
if mode in get_markers.keys() and get_markers[mode]:
|
||||
@@ -683,13 +670,9 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
|
||||
j['security'] = 'psk-mixed'
|
||||
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
|
||||
test_cases["wpa_2g"] = True
|
||||
allure.attach(body=str(creates_profile),
|
||||
name="SSID Profile Created")
|
||||
except Exception as e:
|
||||
print(e)
|
||||
test_cases["wpa2_personal"] = False
|
||||
allure.attach(body=str(e),
|
||||
name="SSID Profile Creation Failed")
|
||||
if mode == "wpa3_personal":
|
||||
for j in profile_data["ssid"][mode]:
|
||||
if mode in get_markers.keys() and get_markers[mode]:
|
||||
@@ -702,13 +685,9 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
|
||||
j['security'] = 'sae'
|
||||
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
|
||||
test_cases["wpa_2g"] = True
|
||||
allure.attach(body=str(creates_profile),
|
||||
name="SSID Profile Created")
|
||||
except Exception as e:
|
||||
print(e)
|
||||
test_cases["wpa2_personal"] = False
|
||||
allure.attach(body=str(e),
|
||||
name="SSID Profile Creation Failed")
|
||||
if mode == "wpa3_personal_mixed":
|
||||
for j in profile_data["ssid"][mode]:
|
||||
if mode in get_markers.keys() and get_markers[mode]:
|
||||
@@ -721,13 +700,9 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
|
||||
j['security'] = 'sae-mixed'
|
||||
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
|
||||
test_cases["wpa_2g"] = True
|
||||
allure.attach(body=str(creates_profile),
|
||||
name="SSID Profile Created")
|
||||
except Exception as e:
|
||||
print(e)
|
||||
test_cases["wpa2_personal"] = False
|
||||
allure.attach(body=str(e),
|
||||
name="SSID Profile Creation Failed")
|
||||
|
||||
# EAP SSID Modes
|
||||
if mode == "wpa2_enterprise":
|
||||
@@ -746,18 +721,13 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
|
||||
radius_auth_data=RADIUS_SERVER_DATA,
|
||||
radius_accounting_data=RADIUS_ACCOUNTING_DATA)
|
||||
test_cases["wpa_2g"] = True
|
||||
allure.attach(body=str(creates_profile),
|
||||
name="SSID Profile Created")
|
||||
except Exception as e:
|
||||
print(e)
|
||||
test_cases["wpa2_personal"] = False
|
||||
allure.attach(body=str(e),
|
||||
name="SSID Profile Creation Failed")
|
||||
ap_ssh = get_apnos(get_configuration['access_point'][0], pwd="../libs/apnos/", sdk="2.x")
|
||||
connected, latest, active = ap_ssh.get_ucentral_status()
|
||||
print(2, instantiate_profile_obj.sdk_client)
|
||||
if connected == False:
|
||||
pytest.exit("AP is disconnected")
|
||||
pytest.exit("AP is disconnected from UC Gateway")
|
||||
instantiate_profile_obj.push_config(serial_number=get_equipment_id[0])
|
||||
config = json.loads(str(instantiate_profile_obj.base_profile_config).replace(" ", "").replace("'", '"'))
|
||||
config["uuid"] = 0
|
||||
@@ -773,6 +743,8 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
|
||||
x += 1
|
||||
ap_config_latest = ap_ssh.get_uc_latest_config()
|
||||
ap_config_latest["uuid"] = 0
|
||||
print("latest config: ", ap_config_latest)
|
||||
print("config: ", config)
|
||||
if x == 19:
|
||||
break
|
||||
if x < 19:
|
||||
@@ -787,11 +759,11 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
|
||||
time.sleep(5)
|
||||
x += 1
|
||||
ap_config_latest = ap_ssh.get_uc_latest_config()
|
||||
print(ap_config_latest)
|
||||
ap_config_latest["uuid"] = 0
|
||||
|
||||
ap_config_active = ap_ssh.get_uc_active_config()
|
||||
print(ap_config_active)
|
||||
print("latest config: ", ap_config_latest)
|
||||
print("Active config: ", ap_config_active)
|
||||
ap_config_active["uuid"] = 0
|
||||
if x == 19:
|
||||
break
|
||||
@@ -956,7 +928,6 @@ def get_vif_state(get_apnos, get_configuration, request, lf_tools):
|
||||
ap_ssh = get_apnos(get_configuration['access_point'][0], pwd="../libs/apnos/")
|
||||
vif_state = list(ap_ssh.get_vif_state_ssids())
|
||||
vif_state.sort()
|
||||
allure.attach(name="vif_state", body=str(vif_state))
|
||||
yield vif_state
|
||||
else:
|
||||
yield lf_tools.ssid_list
|
||||
@@ -967,5 +938,4 @@ def get_vlan_list(get_apnos, get_configuration):
|
||||
ap_ssh = get_apnos(get_configuration['access_point'][0], pwd="../libs/apnos/")
|
||||
vlan_list = list(ap_ssh.get_vlan())
|
||||
vlan_list.sort()
|
||||
allure.attach(name="vlan_list", body=str(vlan_list))
|
||||
yield vlan_list
|
||||
|
||||
@@ -119,8 +119,7 @@ class TestBridgeModeConnectivitySuiteA(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
|
||||
assert result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@@ -146,8 +145,7 @@ class TestBridgeModeConnectivitySuiteA(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
|
||||
assert result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@@ -239,7 +237,6 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
pytest -m "client_connectivity and bridge and suiteB"
|
||||
"""
|
||||
|
||||
|
||||
@pytest.mark.wpa3_personal
|
||||
@pytest.mark.twog
|
||||
@allure.story('open 2.4 GHZ Band')
|
||||
@@ -293,7 +290,6 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa3_personal_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.story('open 2.4 GHZ Band')
|
||||
@@ -321,7 +317,6 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa3_personal_mixed
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('open 5 GHZ Band')
|
||||
@@ -348,7 +343,6 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa_wpa2_personal_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.story('wpa wpa2 personal mixed 2.4 GHZ Band')
|
||||
@@ -377,7 +371,6 @@ class TestBridgeModeConnectivitySuiteTwo(object):
|
||||
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa_wpa2_personal_mixed
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('wpa wpa2 personal mixed 5 GHZ Band')
|
||||
|
||||
@@ -241,7 +241,6 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
pytest -m "client_connectivity and NAT and suiteB"
|
||||
"""
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa3_personal
|
||||
@pytest.mark.twog
|
||||
@allure.story('open 2.4 GHZ Band')
|
||||
@@ -265,11 +264,9 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa3_personal
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('open 5 GHZ Band')
|
||||
@@ -292,11 +289,9 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa3_personal_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.story('open 2.4 GHZ Band')
|
||||
@@ -321,11 +316,9 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa3_personal_mixed
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('open 5 GHZ Band')
|
||||
@@ -349,11 +342,9 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa_wpa2_personal_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.story('wpa wpa2 personal mixed 2.4 GHZ Band')
|
||||
@@ -379,11 +370,9 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@pytest.mark.wpa_wpa2_personal_mixed
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('wpa wpa2 personal mixed 5 GHZ Band')
|
||||
@@ -407,8 +396,6 @@ class TestNATModeConnectivitySuiteB(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
assert result
|
||||
|
||||
# WEP Security Feature not available
|
||||
|
||||
@@ -66,8 +66,6 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
assert result
|
||||
|
||||
@pytest.mark.open
|
||||
@@ -93,8 +91,6 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
assert result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@@ -121,8 +117,6 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
assert result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@@ -149,8 +143,6 @@ class TestvlanModeConnectivitySuiteA(object):
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
assert result
|
||||
|
||||
@pytest.mark.sanity_light
|
||||
@@ -266,8 +258,7 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@@ -293,8 +284,6 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@@ -322,8 +311,6 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@@ -350,8 +337,6 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@@ -380,8 +365,6 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
passes, result = lf_test.Client_Connectivity(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_twog, vlan_id=vlan)
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
assert result
|
||||
|
||||
@pytest.mark.uc_sanity
|
||||
@@ -409,8 +392,6 @@ class TestvlanModeConnectivitySuiteTwo(object):
|
||||
passkey=security_key, mode=mode, band=band,
|
||||
station_name=station_names_fiveg, vlan_id=vlan)
|
||||
|
||||
if not result:
|
||||
pytest.xfail("ssid issue")
|
||||
assert result
|
||||
|
||||
# WEP Security Feature not available
|
||||
|
||||
Reference in New Issue
Block a user