mirror of
				https://github.com/Telecominfraproject/wlan-testing.git
				synced 2025-10-30 18:38:06 +00:00 
			
		
		
		
	Wifi 12467 (#832)
* Added 6 gateway service API test cases Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added more gw API's methods Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added 6 test cases Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added sleep Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added methods for gw radius proxy configuration and radius sessions API's Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added 2 test cases Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> * Added ow_sanity_lf marker only in sanity test cases Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com> --------- Signed-off-by: jitendracandela <jitendra.kushavah@candelatech.com>
This commit is contained in:
		| @@ -264,6 +264,24 @@ class Controller(ConfigureController): | |||||||
|         version = resp.json() |         version = resp.json() | ||||||
|         return version['version'] |         return version['version'] | ||||||
|  |  | ||||||
|  |     def perform_system_wide_commands(self, payload): | ||||||
|  |         uri = self.build_uri("system") | ||||||
|  |         payload = json.dumps(payload) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Data: " + str(payload) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Data: " + str(payload) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.post(uri, data=payload, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |  | ||||||
|  |         self.check_response("POST", resp, self.make_headers(), payload, uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|     def get_sdk_version_fms(self): |     def get_sdk_version_fms(self): | ||||||
|         uri = self.build_url_fms("system?command=info") |         uri = self.build_url_fms("system?command=info") | ||||||
|         logging.info("Sending Command: " + "\n" + |         logging.info("Sending Command: " + "\n" + | ||||||
| @@ -788,6 +806,383 @@ class Controller(ConfigureController): | |||||||
|         allure.attach.file(name="file", source="gopi.tar.gz", extension=".tar") |         allure.attach.file(name="file", source="gopi.tar.gz", extension=".tar") | ||||||
|         return resp |         return resp | ||||||
|  |  | ||||||
|  |     def get_lists_of_all_default_configurations(self): | ||||||
|  |         uri = self.build_uri("default_configurations") | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.get(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("GET", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def get_list_of_OUIs(self, maclist): | ||||||
|  |         uri = self.build_uri("ouis" + "?macList=" + maclist) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.get(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("GET", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def get_list_of_scripts(self): | ||||||
|  |         uri = self.build_uri("scripts") | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.get(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("GET", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def get_list_of_blacklisted_devices(self): | ||||||
|  |         uri = self.build_uri("blacklist") | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.get(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("GET", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def get_radius_proxy_configuration(self): | ||||||
|  |         uri = self.build_uri("radiusProxyConfig") | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.get(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("GET", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def get_country_code_for_ip_address(self, iplist): | ||||||
|  |         uri = self.build_uri("iptocountry" + "?iplist=" + iplist) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.get(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("GET", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def create_default_configuration(self, name, payload): | ||||||
|  |         uri = self.build_uri("default_configuration/" + name) | ||||||
|  |         payload = json.dumps(payload) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Data: " + str(payload) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Data: " + str(payload) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.post(uri, data=payload, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |  | ||||||
|  |         self.check_response("POST", resp, self.make_headers(), payload, uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def get_default_configuration(self, name): | ||||||
|  |         uri = self.build_uri("default_configuration/" + name) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.get(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("GET", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def edit_default_configuration(self, name, payload): | ||||||
|  |         uri = self.build_uri("default_configuration/" + name) | ||||||
|  |         payload = json.dumps(payload) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Data: " + str(payload) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Data: " + str(payload) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.put(uri, data=payload, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |  | ||||||
|  |         self.check_response("PUT", resp, self.make_headers(), payload, uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def delete_default_configuration(self, name): | ||||||
|  |         uri = self.build_uri("default_configuration/" + name) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.delete(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("DELETE", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def create_to_the_blacklist(self, serial_number, payload): | ||||||
|  |         uri = self.build_uri("blacklist/" + serial_number) | ||||||
|  |         payload = json.dumps(payload) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Data: " + str(payload) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Data: " + str(payload) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.post(uri, data=payload, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |  | ||||||
|  |         self.check_response("POST", resp, self.make_headers(), payload, uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def get_blacklist_entry(self, serial_number): | ||||||
|  |         uri = self.build_uri("blacklist/" + serial_number) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.get(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("GET", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def modify_to_the_blacklist(self, serial_number, payload): | ||||||
|  |         uri = self.build_uri("blacklist/" + serial_number) | ||||||
|  |         payload = json.dumps(payload) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Data: " + str(payload) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Data: " + str(payload) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.put(uri, data=payload, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |  | ||||||
|  |         self.check_response("PUT", resp, self.make_headers(), payload, uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def delete_from_blacklist(self, serial_number): | ||||||
|  |         uri = self.build_uri("blacklist/" + serial_number) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.delete(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("DELETE", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def debug_device(self, serial_number, payload): | ||||||
|  |         uri = self.build_uri("device/" + serial_number + "/script") | ||||||
|  |         payload = json.dumps(payload) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Data: " + str(payload) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Data: " + str(payload) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.post(uri, data=payload, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         time.sleep(10) | ||||||
|  |         self.check_response("POST", resp, self.make_headers(), payload, uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def delete_file(self, serial_number, uuid): | ||||||
|  |         uri = self.build_uri("file/" + uuid + "?serialNumber=" + serial_number) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.delete(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         time.sleep(10) | ||||||
|  |         self.check_response("DELETE", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def delete_some_commands(self, serial_number): | ||||||
|  |         uri = self.build_uri("commands" + "?serialNumber=" + serial_number) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.delete(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("DELETE", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def delete_some_device_logs(self, serial_number): | ||||||
|  |         uri = self.build_uri("device/" + serial_number + "/logs") | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.delete(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("DELETE", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def delete_some_device_health_checks(self, serial_number): | ||||||
|  |         uri = self.build_uri("device/" + serial_number + "/healthchecks") | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.delete(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("DELETE", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def delete_capabilities_device(self, serial_number): | ||||||
|  |         uri = self.build_uri("device/" + serial_number + "/capabilities") | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.delete(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("DELETE", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def delete_statistics_device(self, serial_number): | ||||||
|  |         uri = self.build_uri("device/" + serial_number + "/statistics") | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.delete(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("DELETE", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def delete_radius_proxy_configuration(self): | ||||||
|  |         uri = self.build_uri("radiusProxyConfig") | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.delete(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("DELETE", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def modify_radius_proxy_configuration(self, payload): | ||||||
|  |         uri = self.build_uri("radiusProxyConfig") | ||||||
|  |         payload = json.dumps(payload) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Data: " + str(payload) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Data: " + str(payload) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.put(uri, data=payload, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         time.sleep(2) | ||||||
|  |         self.check_response("PUT", resp, self.make_headers(), payload, uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def get_radius_proxy_configuration(self): | ||||||
|  |         uri = self.build_uri("radiusProxyConfig") | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.get(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("GET", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |     def get_radius_sessions(self, serial_number): | ||||||
|  |         uri = self.build_uri("radiusSessions/" + serial_number) | ||||||
|  |         logging.info("Sending Command: " + "\n" + | ||||||
|  |                      "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                      "URI: " + str(uri) + "\n" + | ||||||
|  |                      "Headers: " + str(self.make_headers())) | ||||||
|  |         allure.attach(name="Sending Command:", body="Sending Command: " + "\n" + | ||||||
|  |                                                     "TimeStamp: " + str(datetime.datetime.utcnow()) + "\n" + | ||||||
|  |                                                     "URI: " + str(uri) + "\n" + | ||||||
|  |                                                     "Headers: " + str(self.make_headers())) | ||||||
|  |         resp = requests.get(uri, headers=self.make_headers(), verify=False, timeout=120) | ||||||
|  |         self.check_response("GET", resp, self.make_headers(), "", uri) | ||||||
|  |         return resp | ||||||
|  |  | ||||||
|  |  | ||||||
|  |  | ||||||
|  |  | ||||||
| class FMSUtils: | class FMSUtils: | ||||||
|  |  | ||||||
|   | |||||||
| @@ -15,7 +15,6 @@ import pytest | |||||||
|  |  | ||||||
| @pytest.mark.uc_sanity | @pytest.mark.uc_sanity | ||||||
| @pytest.mark.ow_sdk_tests | @pytest.mark.ow_sdk_tests | ||||||
| @pytest.mark.ow_sanity_lf |  | ||||||
| @pytest.mark.ow_sdk_load_tests | @pytest.mark.ow_sdk_load_tests | ||||||
| @pytest.mark.owgw_api_tests | @pytest.mark.owgw_api_tests | ||||||
| @allure.parent_suite("SDK Tests") | @allure.parent_suite("SDK Tests") | ||||||
| @@ -125,6 +124,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.testcase(name="WIFI-11399", |     @allure.testcase(name="WIFI-11399", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11399") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11399") | ||||||
|     @pytest.mark.get_all_devices |     @pytest.mark.get_all_devices | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gwservice_listdevices(self, get_target_object): |     def test_gwservice_listdevices(self, get_target_object): | ||||||
|         """ |         """ | ||||||
|             Test the list of devices endpoint |             Test the list of devices endpoint | ||||||
| @@ -140,6 +140,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.testcase(name="WIFI-11399", |     @allure.testcase(name="WIFI-11399", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11399") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11399") | ||||||
|     @pytest.mark.CRUD |     @pytest.mark.CRUD | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gwservice_create_read_edit_delete_device(self, get_target_object, selected_testbed): |     def test_gwservice_create_read_edit_delete_device(self, get_target_object, selected_testbed): | ||||||
|         """ |         """ | ||||||
|             Test to create,read,edit and delete device endpoint |             Test to create,read,edit and delete device endpoint | ||||||
| @@ -209,6 +210,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.testcase(name="WIFI-11436", |     @allure.testcase(name="WIFI-11436", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11436") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11436") | ||||||
|     @pytest.mark.OW_gateway_service |     @pytest.mark.OW_gateway_service | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_system_info_gw(self, get_target_object): |     def test_system_info_gw(self, get_target_object): | ||||||
|         """ |         """ | ||||||
|         Test to verify OW gateway services |         Test to verify OW gateway services | ||||||
| @@ -223,6 +225,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.title("Get OW Gateway Commands") |     @allure.title("Get OW Gateway Commands") | ||||||
|     @allure.testcase(name="WIFI-11437", |     @allure.testcase(name="WIFI-11437", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11437") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11437") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_commands(self, get_target_object, get_testbed_details): |     def test_gw_commands(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|         Test to verify OW gateway commands executed |         Test to verify OW gateway commands executed | ||||||
| @@ -239,6 +242,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.title("Get Device Logs") |     @allure.title("Get Device Logs") | ||||||
|     @allure.testcase(name="WIFI-11438", |     @allure.testcase(name="WIFI-11438", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11438") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11438") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_service_get_logs(self, get_target_object, get_testbed_details): |     def test_gw_service_get_logs(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|             Test the device logs present in Gateway UI |             Test the device logs present in Gateway UI | ||||||
| @@ -255,6 +259,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.title("Get Health Checks") |     @allure.title("Get Health Checks") | ||||||
|     @allure.testcase(name="WIFI-11439", |     @allure.testcase(name="WIFI-11439", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11439") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11439") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_service_get_health_checks(self, get_target_object, get_testbed_details): |     def test_gw_service_get_health_checks(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|             Test the device health checks present in Gateway UI |             Test the device health checks present in Gateway UI | ||||||
| @@ -270,6 +275,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.title("Get Capabilities") |     @allure.title("Get Capabilities") | ||||||
|     @allure.testcase(name="WIFI-11441", |     @allure.testcase(name="WIFI-11441", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11441") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11441") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_service_get_capabilities(self, get_target_object, get_testbed_details): |     def test_gw_service_get_capabilities(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|             Test the device capabilities present in Gateway UI |             Test the device capabilities present in Gateway UI | ||||||
| @@ -286,6 +292,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.title("Get Statistics") |     @allure.title("Get Statistics") | ||||||
|     @allure.testcase(name="WIFI-11442", |     @allure.testcase(name="WIFI-11442", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11442") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11442") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_service_get_statistics(self, get_target_object, get_testbed_details): |     def test_gw_service_get_statistics(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|             Test the device statistics present in Gateway UI |             Test the device statistics present in Gateway UI | ||||||
| @@ -301,6 +308,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.title("Get Device Status") |     @allure.title("Get Device Status") | ||||||
|     @allure.testcase(name="WIFI-11443", |     @allure.testcase(name="WIFI-11443", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11443") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11443") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_service_get_status(self, get_target_object, get_testbed_details): |     def test_gw_service_get_status(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|             Test the device status present in Gateway UI |             Test the device status present in Gateway UI | ||||||
| @@ -316,6 +324,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.title("Ping Device") |     @allure.title("Ping Device") | ||||||
|     @allure.testcase(name="WIFI-11444", |     @allure.testcase(name="WIFI-11444", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11444") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11444") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_service_ping_device(self, get_target_object, get_testbed_details): |     def test_gw_service_ping_device(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|             Test to Ping device present in Gateway UI |             Test to Ping device present in Gateway UI | ||||||
| @@ -335,6 +344,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.title("Blink LED API") |     @allure.title("Blink LED API") | ||||||
|     @allure.testcase(name="WIFI-11445", |     @allure.testcase(name="WIFI-11445", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11445") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11445") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_service_led_blink_device(self, get_target_object, get_testbed_details): |     def test_gw_service_led_blink_device(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|             Test to Blink led on device present in Gateway UI |             Test to Blink led on device present in Gateway UI | ||||||
| @@ -358,6 +368,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.title("Trace Command") |     @allure.title("Trace Command") | ||||||
|     @allure.testcase(name="WIFI-11446", |     @allure.testcase(name="WIFI-11446", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11446") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11446") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_service_trace_device(self, get_target_object, get_testbed_details): |     def test_gw_service_trace_device(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|             Test to trace device present in Gateway UI |             Test to trace device present in Gateway UI | ||||||
| @@ -382,6 +393,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.title("Wi-Fi Scan Device") |     @allure.title("Wi-Fi Scan Device") | ||||||
|     @allure.testcase(name="WIFI-11447", |     @allure.testcase(name="WIFI-11447", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11447") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11447") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_service_wifi_scan_device(self, get_target_object, get_testbed_details): |     def test_gw_service_wifi_scan_device(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|             Test to Wi-Fi scan device present in Gateway UI |             Test to Wi-Fi scan device present in Gateway UI | ||||||
| @@ -409,6 +421,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.title("Request Message Device") |     @allure.title("Request Message Device") | ||||||
|     @allure.testcase(name="WIFI-11448", |     @allure.testcase(name="WIFI-11448", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11448") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11448") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_service_request_msg_device(self, get_target_object, get_testbed_details): |     def test_gw_service_request_msg_device(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|             Test to Request specific msg from device present in Gateway UI |             Test to Request specific msg from device present in Gateway UI | ||||||
| @@ -431,6 +444,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.title("Get Event Queue of Device") |     @allure.title("Get Event Queue of Device") | ||||||
|     @allure.testcase(name="WIFI-11452", |     @allure.testcase(name="WIFI-11452", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11452") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11452") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_service_event_queue_device(self, get_target_object, get_testbed_details): |     def test_gw_service_event_queue_device(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|             Test to Request Event Queue from device present in Gateway UI |             Test to Request Event Queue from device present in Gateway UI | ||||||
| @@ -454,6 +468,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @allure.title("Telemetry Device") |     @allure.title("Telemetry Device") | ||||||
|     @allure.testcase(name="WIFI-11453", |     @allure.testcase(name="WIFI-11453", | ||||||
|                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11453") |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-11453") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_service_telemetry_device(self, get_target_object, get_testbed_details): |     def test_gw_service_telemetry_device(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|             Test to Request telemetry from device present in Gateway UI |             Test to Request telemetry from device present in Gateway UI | ||||||
| @@ -481,6 +496,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @pytest.mark.ow_sdk_load_tests |     @pytest.mark.ow_sdk_load_tests | ||||||
|     @pytest.mark.owgw_api_tests |     @pytest.mark.owgw_api_tests | ||||||
|     @allure.title("RTTY API") |     @allure.title("RTTY API") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_gw_service_get_rtty(self, get_target_object, get_testbed_details): |     def test_gw_service_get_rtty(self, get_target_object, get_testbed_details): | ||||||
|         """ |         """ | ||||||
|             Test the device rtty parameters in Gateway UI |             Test the device rtty parameters in Gateway UI | ||||||
| @@ -494,6 +510,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @pytest.mark.gw_asb_non_restricted |     @pytest.mark.gw_asb_non_restricted | ||||||
|     @allure.title("Asb script on non restricted AP") |     @allure.title("Asb script on non restricted AP") | ||||||
|     @allure.testcase(name="WIFI-12235", url="https://telecominfraproject.atlassian.net/browse/WIFI-12235") |     @allure.testcase(name="WIFI-12235", url="https://telecominfraproject.atlassian.net/browse/WIFI-12235") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_asb_on_non_restricted_ap(self, get_target_object, get_testbed_details): |     def test_asb_on_non_restricted_ap(self, get_target_object, get_testbed_details): | ||||||
|         device_name = get_testbed_details['device_under_tests'][0]['identifier'] |         device_name = get_testbed_details['device_under_tests'][0]['identifier'] | ||||||
|         payload = { |         payload = { | ||||||
| @@ -529,6 +546,7 @@ class TestUcentralGatewayService(object): | |||||||
|     @pytest.mark.gw_asb_restricted |     @pytest.mark.gw_asb_restricted | ||||||
|     @allure.title("Asb script on restricted AP") |     @allure.title("Asb script on restricted AP") | ||||||
|     @allure.testcase(name="WIFI-12236", url="https://telecominfraproject.atlassian.net/browse/WIFI-12236") |     @allure.testcase(name="WIFI-12236", url="https://telecominfraproject.atlassian.net/browse/WIFI-12236") | ||||||
|  |     @pytest.mark.ow_sanity_lf | ||||||
|     def test_asb_on_restricted_ap(self, get_target_object, get_testbed_details): |     def test_asb_on_restricted_ap(self, get_target_object, get_testbed_details): | ||||||
|         device_name = get_testbed_details['device_under_tests'][0]['identifier'] |         device_name = get_testbed_details['device_under_tests'][0]['identifier'] | ||||||
|         payload = { |         payload = { | ||||||
| @@ -565,5 +583,468 @@ class TestUcentralGatewayService(object): | |||||||
|         else: |         else: | ||||||
|             logging.info("Removed Restrictions") |             logging.info("Removed Restrictions") | ||||||
|  |  | ||||||
|  |     @pytest.mark.gw_list_of_OUIs | ||||||
|  |     @allure.title("Get a list of OUIs") | ||||||
|  |     @allure.testcase(name="WIFI-12554", | ||||||
|  |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-12554") | ||||||
|  |     def test_gw_service_get_list_of_OUIs(self, get_target_object, get_testbed_details): | ||||||
|  |         """ | ||||||
|  |             Get a list of OUIs | ||||||
|  |             Unique marker:pytest -m "gw_list_of_OUIs" | ||||||
|  |         """ | ||||||
|  |         device_name = get_testbed_details['device_under_tests'][0]['identifier'] | ||||||
|  |         mac_list = ':'.join(device_name[i:i + 2] for i in range(0, len(device_name), 2)) | ||||||
|  |         resp = get_target_object.controller_library_object.get_list_of_OUIs(maclist=mac_list) | ||||||
|  |         assert resp.status_code == 200 | ||||||
|  |  | ||||||
|  |     @pytest.mark.gw_list_of_scripts | ||||||
|  |     @allure.title("Get a list scripts") | ||||||
|  |     @allure.testcase(name="WIFI-12555", | ||||||
|  |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-12555") | ||||||
|  |     def test_gw_service_get_list_of_scripts(self, get_target_object, get_testbed_details): | ||||||
|  |         """ | ||||||
|  |             Get a list scripts | ||||||
|  |             Unique marker:pytest -m "gw_list_of_scripts" | ||||||
|  |         """ | ||||||
|  |         resp = get_target_object.controller_library_object.get_list_of_scripts() | ||||||
|  |         assert resp.status_code == 200 | ||||||
|  |  | ||||||
|  |     @pytest.mark.gw_delete_update_read_radius_proxy_configuration | ||||||
|  |     @allure.title("Delete, Update, Read RADIUS Proxy configuration") | ||||||
|  |     @allure.testcase(name="WIFI-12557", | ||||||
|  |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-12557") | ||||||
|  |     def test_gw_service_delete_update_read_radius_proxy_configuration(self, get_target_object, get_testbed_details): | ||||||
|  |         """ | ||||||
|  |             Delete, Update, read RADIUS Proxy configuration | ||||||
|  |             Unique marker:pytest -m "gw_delete_update_read_radius_proxy_configuration" | ||||||
|  |         """ | ||||||
|  |         # Delete RADIUS Proxy configuration | ||||||
|  |         resp = get_target_object.controller_library_object.delete_radius_proxy_configuration() | ||||||
|  |         assert resp.status_code == 200 | ||||||
|  |         # Modify RADIUS Proxy configuration | ||||||
|  |         editing_payload = { | ||||||
|  |             "pools": [ | ||||||
|  |                 { | ||||||
|  |                     "acctConfig": { | ||||||
|  |                         "methodParameters": [], | ||||||
|  |                         "monitor": False, | ||||||
|  |                         "monitorMethod": "none", | ||||||
|  |                         "servers": [ | ||||||
|  |                             { | ||||||
|  |                                 "allowSelfSigned": False, | ||||||
|  |                                 "certificate": "", | ||||||
|  |                                 "ignore": False, | ||||||
|  |                                 "ip": "10.10.1.221", | ||||||
|  |                                 "name": "svr1", | ||||||
|  |                                 "port": 1813, | ||||||
|  |                                 "radsec": False, | ||||||
|  |                                 "radsecCacerts": [], | ||||||
|  |                                 "radsecCert": "", | ||||||
|  |                                 "radsecKey": "", | ||||||
|  |                                 "radsecPort": 2083, | ||||||
|  |                                 "radsecRealms": [], | ||||||
|  |                                 "radsecSecret": "", | ||||||
|  |                                 "secret": "testing123", | ||||||
|  |                                 "weight": 10 | ||||||
|  |                             }, | ||||||
|  |                             { | ||||||
|  |                                 "allowSelfSigned": False, | ||||||
|  |                                 "certificate": "", | ||||||
|  |                                 "ignore": False, | ||||||
|  |                                 "ip": "10.10.1.221", | ||||||
|  |                                 "name": "svr2", | ||||||
|  |                                 "port": 1813, | ||||||
|  |                                 "radsec": False, | ||||||
|  |                                 "radsecCacerts": [], | ||||||
|  |                                 "radsecCert": "", | ||||||
|  |                                 "radsecKey": "", | ||||||
|  |                                 "radsecPort": 2083, | ||||||
|  |                                 "radsecRealms": [], | ||||||
|  |                                 "radsecSecret": "", | ||||||
|  |                                 "secret": "testing123", | ||||||
|  |                                 "weight": 20 | ||||||
|  |                             } | ||||||
|  |                         ], | ||||||
|  |                         "strategy": "random" | ||||||
|  |                     }, | ||||||
|  |                     "authConfig": { | ||||||
|  |                         "methodParameters": [], | ||||||
|  |                         "monitor": False, | ||||||
|  |                         "monitorMethod": "none", | ||||||
|  |                         "servers": [ | ||||||
|  |                             { | ||||||
|  |                                 "allowSelfSigned": False, | ||||||
|  |                                 "certificate": "", | ||||||
|  |                                 "ignore": False, | ||||||
|  |                                 "ip": "10.10.1.221", | ||||||
|  |                                 "name": "svr1", | ||||||
|  |                                 "port": 1812, | ||||||
|  |                                 "radsec": False, | ||||||
|  |                                 "radsecCacerts": [], | ||||||
|  |                                 "radsecCert": "", | ||||||
|  |                                 "radsecKey": "", | ||||||
|  |                                 "radsecPort": 2083, | ||||||
|  |                                 "radsecRealms": [], | ||||||
|  |                                 "radsecSecret": "", | ||||||
|  |                                 "secret": "testing123", | ||||||
|  |                                 "weight": 10 | ||||||
|  |                             }, | ||||||
|  |                             { | ||||||
|  |                                 "allowSelfSigned": False, | ||||||
|  |                                 "certificate": "", | ||||||
|  |                                 "ignore": False, | ||||||
|  |                                 "ip": "10.10.1.221", | ||||||
|  |                                 "name": "svr2", | ||||||
|  |                                 "port": 1812, | ||||||
|  |                                 "radsec": False, | ||||||
|  |                                 "radsecCacerts": [], | ||||||
|  |                                 "radsecCert": "", | ||||||
|  |                                 "radsecKey": "", | ||||||
|  |                                 "radsecPort": 2083, | ||||||
|  |                                 "radsecRealms": [], | ||||||
|  |                                 "radsecSecret": "", | ||||||
|  |                                 "secret": "testing123", | ||||||
|  |                                 "weight": 20 | ||||||
|  |                             } | ||||||
|  |                         ], | ||||||
|  |                         "strategy": "weighted" | ||||||
|  |                     }, | ||||||
|  |                     "coaConfig": { | ||||||
|  |                         "methodParameters": [], | ||||||
|  |                         "monitor": False, | ||||||
|  |                         "monitorMethod": "none", | ||||||
|  |                         "servers": [ | ||||||
|  |                             { | ||||||
|  |                                 "allowSelfSigned": False, | ||||||
|  |                                 "certificate": "", | ||||||
|  |                                 "ignore": False, | ||||||
|  |                                 "ip": "10.10.1.221", | ||||||
|  |                                 "name": "svr1", | ||||||
|  |                                 "port": 3799, | ||||||
|  |                                 "radsec": False, | ||||||
|  |                                 "radsecCacerts": [], | ||||||
|  |                                 "radsecCert": "", | ||||||
|  |                                 "radsecKey": "", | ||||||
|  |                                 "radsecPort": 2083, | ||||||
|  |                                 "radsecRealms": [], | ||||||
|  |                                 "radsecSecret": "", | ||||||
|  |                                 "secret": "testing123", | ||||||
|  |                                 "weight": 10 | ||||||
|  |                             }, | ||||||
|  |                             { | ||||||
|  |                                 "allowSelfSigned": False, | ||||||
|  |                                 "certificate": "", | ||||||
|  |                                 "ignore": False, | ||||||
|  |                                 "ip": "10.10.1.221", | ||||||
|  |                                 "name": "svr2", | ||||||
|  |                                 "port": 3799, | ||||||
|  |                                 "radsec": False, | ||||||
|  |                                 "radsecCacerts": [], | ||||||
|  |                                 "radsecCert": "", | ||||||
|  |                                 "radsecKey": "", | ||||||
|  |                                 "radsecPort": 2083, | ||||||
|  |                                 "radsecRealms": [], | ||||||
|  |                                 "radsecSecret": "", | ||||||
|  |                                 "secret": "testing123", | ||||||
|  |                                 "weight": 20 | ||||||
|  |                             } | ||||||
|  |                         ], | ||||||
|  |                         "strategy": "round_robin" | ||||||
|  |                     }, | ||||||
|  |                     "description": "master pool", | ||||||
|  |                     "name": "master", | ||||||
|  |                     "useByDefault": True | ||||||
|  |                 } | ||||||
|  |             ] | ||||||
|  |         } | ||||||
|  |         resp = get_target_object.controller_library_object.modify_radius_proxy_configuration(editing_payload) | ||||||
|  |         assert resp.status_code == 200 | ||||||
|  |         # Retrieve RADIUS Proxy configuration | ||||||
|  |         resp = get_target_object.controller_library_object.get_radius_proxy_configuration() | ||||||
|  |         assert resp.status_code == 200 | ||||||
|  |  | ||||||
|  |  | ||||||
|  |     @pytest.mark.gw_country_code_for_ip_address | ||||||
|  |     @allure.title("Get the country code for an IP address") | ||||||
|  |     @allure.testcase(name="WIFI-12558", | ||||||
|  |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-12558") | ||||||
|  |     def test_gw_service_get_country_code_for_ip_address(self, get_target_object, get_testbed_details): | ||||||
|  |         """ | ||||||
|  |             Get the country code for an IP address | ||||||
|  |             Unique marker:pytest -m "gw_country_code_for_ip_address" | ||||||
|  |         """ | ||||||
|  |         iplist = get_testbed_details['device_under_tests'][0]['host_ip'] | ||||||
|  |         print("iplist", iplist) | ||||||
|  |         resp = get_target_object.controller_library_object.get_country_code_for_ip_address(iplist=iplist) | ||||||
|  |         assert resp.status_code == 200 | ||||||
|  |  | ||||||
|  |     @pytest.mark.gw_lists_of_all_default_configurations | ||||||
|  |     @allure.title("Get lists of all default configurations") | ||||||
|  |     @allure.testcase(name="WIFI-12553", | ||||||
|  |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-12553") | ||||||
|  |     def test_gw_service_get_lists_of_all_default_configurations(self, get_target_object, get_testbed_details): | ||||||
|  |         """ | ||||||
|  |             Retrieve the lists of all default configurations | ||||||
|  |             Unique marker:pytest -m "gw_lists_of_all_default_configurations" | ||||||
|  |         """ | ||||||
|  |         resp = get_target_object.controller_library_object.get_lists_of_all_default_configurations() | ||||||
|  |         assert resp.status_code == 200 | ||||||
|  |  | ||||||
|  |     @allure.title("CRUD a default configuration") | ||||||
|  |     @allure.testcase(name="WIFI-12619", | ||||||
|  |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-12619") | ||||||
|  |     @pytest.mark.gw_crud_default_configuration | ||||||
|  |     def test_gw_service_create_read_edit_delete_default_configuration(self, get_target_object, get_testbed_details): | ||||||
|  |         """ | ||||||
|  |             Test to create,read,edit and delete default configuration | ||||||
|  |             Unique marker: pytest -m "gw_crud_default_configuration" | ||||||
|  |         """ | ||||||
|  |         device_mac = "02:00:00:%02x:%02x:%02x" % (random.randint(0, 255), | ||||||
|  |                                                   random.randint(0, 255), | ||||||
|  |                                                   random.randint(0, 255)) | ||||||
|  |         device_name = device_mac.replace(":", "") | ||||||
|  |         model = get_testbed_details['device_under_tests'][0]['model'] | ||||||
|  |         # device_name = "deadbeef0011" + testbed.replace("-","") | ||||||
|  |         payload = {'name': device_name, | ||||||
|  |                    "modelIds": [model], | ||||||
|  |                    "description": "Testing through Automation", | ||||||
|  |                    'configuration': self.configuration, | ||||||
|  |                    "created": 0, | ||||||
|  |                    "lastModified": 0 | ||||||
|  |                    } | ||||||
|  |         resp = get_target_object.controller_library_object.create_default_configuration(device_name, payload) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |         resp = get_target_object.controller_library_object.get_default_configuration(device_name) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |         editing_payload = { | ||||||
|  |             "description": "edit_default_configuration" | ||||||
|  |         } | ||||||
|  |         # print(json.dumps(editing_payload)) | ||||||
|  |         resp = get_target_object.controller_library_object.edit_default_configuration(device_name, editing_payload) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |         resp = get_target_object.controller_library_object.delete_default_configuration(device_name) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |     @pytest.mark.gw_list_of_blacklisted_devices | ||||||
|  |     @allure.title("Get list blacklisted devices") | ||||||
|  |     @allure.testcase(name="WIFI-12556", | ||||||
|  |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-12556") | ||||||
|  |     def test_gw_service_get_list_of_blacklisted_devices(self, get_target_object, get_testbed_details): | ||||||
|  |         """ | ||||||
|  |             Get a list blacklisted devices | ||||||
|  |             Unique marker:pytest -m "gw_list_of_blacklisted_devices" | ||||||
|  |         """ | ||||||
|  |         resp = get_target_object.controller_library_object.get_list_of_blacklisted_devices() | ||||||
|  |         assert resp.status_code == 200 | ||||||
|  |  | ||||||
|  |     @allure.title("CRUD a  blacklist entry") | ||||||
|  |     @allure.testcase(name="WIFI-12620", | ||||||
|  |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-12620") | ||||||
|  |     @pytest.mark.gw_crud_blacklist_entry | ||||||
|  |     def test_gw_service_create_read_edit_delete_blacklist_entry(self, get_target_object, get_testbed_details): | ||||||
|  |         """ | ||||||
|  |             Test to create,read,edit and delete blacklist entry | ||||||
|  |             Unique marker: pytest -m "gw_crud_blacklist_entry" | ||||||
|  |         """ | ||||||
|  |         device_mac = "02:00:00:%02x:%02x:%02x" % (random.randint(0, 255), | ||||||
|  |                                                   random.randint(0, 255), | ||||||
|  |                                                   random.randint(0, 255)) | ||||||
|  |         device_name = device_mac.replace(":", "") | ||||||
|  |         # Adding dummy ap | ||||||
|  |         payload = {'serialNumber': device_name, | ||||||
|  |                    'UUID': '123456', | ||||||
|  |                    'configuration': self.configuration, | ||||||
|  |                    'deviceType': 'AP', | ||||||
|  |                    'location': '', | ||||||
|  |                    'macAddress': device_mac, | ||||||
|  |                    'manufacturer': 'Testing through Automation', | ||||||
|  |                    'owner': ''} | ||||||
|  |         resp = get_target_object.controller_library_object.add_device_to_gw(device_name, payload) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |         # Testing blacklist | ||||||
|  |         payload_blacklist = {'serialNumber': device_name, | ||||||
|  |                              'reason': 'Testing through Automation' | ||||||
|  |                              } | ||||||
|  |         resp = get_target_object.controller_library_object.create_to_the_blacklist(device_name, payload_blacklist) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |         resp = get_target_object.controller_library_object.get_blacklist_entry(device_name) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |         editing_payload = { | ||||||
|  |             "reason": "edit blacklist entry" | ||||||
|  |         } | ||||||
|  |         resp = get_target_object.controller_library_object.modify_to_the_blacklist(device_name, editing_payload) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |         resp = get_target_object.controller_library_object.delete_from_blacklist(device_name) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |         # deleting dummy ap | ||||||
|  |         resp = get_target_object.controller_library_object.delete_device_from_gw(device_name) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |     @pytest.mark.gw_debug_device | ||||||
|  |     @allure.title("Debug a device") | ||||||
|  |     @allure.testcase(name="WIFI-12628", | ||||||
|  |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-12628") | ||||||
|  |     def test_gw_service_debug_device(self, get_target_object, get_testbed_details): | ||||||
|  |         """ | ||||||
|  |             Get a file from the upload directory | ||||||
|  |             Unique marker: pytest -m "gw_debug_device" | ||||||
|  |         """ | ||||||
|  |         device_name = get_testbed_details['device_under_tests'][0]['identifier'] | ||||||
|  |         # Running one script | ||||||
|  |         payload = { | ||||||
|  |             "serialNumber": device_name, | ||||||
|  |             "timeout": 30, | ||||||
|  |             "type": "diagnostic", | ||||||
|  |             "script": "", | ||||||
|  |             "scriptId": "", | ||||||
|  |             "when": 0, | ||||||
|  |             "signature": "", | ||||||
|  |             "deferred": True, | ||||||
|  |             "uri": "" | ||||||
|  |         } | ||||||
|  |         resp = get_target_object.controller_library_object.debug_device(device_name, payload) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |     @pytest.mark.gw_get_delete_files | ||||||
|  |     @allure.title("Get and Delete file from the upload directory") | ||||||
|  |     @allure.testcase(name="WIFI-12629", | ||||||
|  |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-12629") | ||||||
|  |     def test_gw_service_get_delete_files(self, get_target_object, get_testbed_details): | ||||||
|  |         """ | ||||||
|  |             Get and Delete file from the upload directory | ||||||
|  |             Unique marker: pytest -m "gw_get_delete_files" | ||||||
|  |         """ | ||||||
|  |         device_name = get_testbed_details['device_under_tests'][0]['identifier'] | ||||||
|  |         # Running one script | ||||||
|  |         payload = { | ||||||
|  |             "serialNumber": device_name, | ||||||
|  |             "timeout": 30, | ||||||
|  |             "type": "diagnostic", | ||||||
|  |             "script": "", | ||||||
|  |             "scriptId": "", | ||||||
|  |             "when": 0, | ||||||
|  |             "signature": "", | ||||||
|  |             "deferred": True, | ||||||
|  |             "uri": "" | ||||||
|  |         } | ||||||
|  |         # Running diagnostic script for uuid | ||||||
|  |         resp = get_target_object.controller_library_object.debug_device(device_name, payload) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |         resp = resp.json() | ||||||
|  |         uuid = resp['UUID'] | ||||||
|  |  | ||||||
|  |         # get file | ||||||
|  |         resp = get_target_object.controller_library_object.get_file(device_name, uuid) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |         # Delete file | ||||||
|  |         resp = get_target_object.controller_library_object.delete_file(device_name, uuid) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |     @pytest.mark.gw_system | ||||||
|  |     @allure.title("Perform some system wide commands") | ||||||
|  |     @allure.testcase(name="WIFI-12627", | ||||||
|  |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-12627") | ||||||
|  |     def test_gw_service_gw_system(self, get_target_object, get_testbed_details): | ||||||
|  |         """ | ||||||
|  |             Perform some system wide commands | ||||||
|  |             Unique marker:pytest -m "gw_system" | ||||||
|  |         """ | ||||||
|  |         payload = { | ||||||
|  |             "command": "setloglevel", | ||||||
|  |             "subsystems": [ | ||||||
|  |                 { | ||||||
|  |                     "tag": "", | ||||||
|  |                     "value": "" | ||||||
|  |                 } | ||||||
|  |             ] | ||||||
|  |         } | ||||||
|  |         resp = get_target_object.controller_library_object.perform_system_wide_commands(payload) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |     @allure.title("Delete commands, device logs, health checks, capabilities and statistics") | ||||||
|  |     @allure.testcase(name="WIFI-12626", | ||||||
|  |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-12626") | ||||||
|  |     @pytest.mark.gw_delete_commands_logs_healthchecks_capabilities_statistics | ||||||
|  |     def test_gw_service_delete_commands_logs_healthchecks_capabilities_statistics(self, get_target_object, | ||||||
|  |                                                                                   get_testbed_details): | ||||||
|  |         """ | ||||||
|  |             Delete commands, device logs, health checks, capabilities and statistics | ||||||
|  |             Unique marker: pytest -m "gw_delete_commands_logs_healthchecks_capabilities_statistics" | ||||||
|  |         """ | ||||||
|  |         device_mac = "02:00:00:%02x:%02x:%02x" % (random.randint(0, 255), | ||||||
|  |                                                   random.randint(0, 255), | ||||||
|  |                                                   random.randint(0, 255)) | ||||||
|  |         device_name = device_mac.replace(":", "") | ||||||
|  |         # Adding dummy ap | ||||||
|  |         payload = {'serialNumber': device_name, | ||||||
|  |                    'UUID': '123456', | ||||||
|  |                    'configuration': self.configuration, | ||||||
|  |                    'deviceType': 'AP', | ||||||
|  |                    'location': '', | ||||||
|  |                    'macAddress': device_mac, | ||||||
|  |                    'manufacturer': 'Testing through Automation', | ||||||
|  |                    'owner': ''} | ||||||
|  |         resp = get_target_object.controller_library_object.add_device_to_gw(device_name, payload) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |         # Deleting Delete some commands | ||||||
|  |         resp = get_target_object.controller_library_object.delete_some_commands(device_name) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |         # Delete some device logs | ||||||
|  |         resp = get_target_object.controller_library_object.delete_some_device_logs(device_name) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |         # Delete some device health checks | ||||||
|  |         resp = get_target_object.controller_library_object.delete_some_device_health_checks(device_name) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |         # Delete the capabilities for a given device | ||||||
|  |         resp = get_target_object.controller_library_object.delete_capabilities_device(device_name) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |         # Get the latest statistics for a given device | ||||||
|  |         resp = get_target_object.controller_library_object.delete_statistics_device(device_name) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |         # Deleting dummy ap | ||||||
|  |         resp = get_target_object.controller_library_object.delete_device_from_gw(device_name) | ||||||
|  |         if resp.status_code != 200: | ||||||
|  |             assert False | ||||||
|  |  | ||||||
|  |     @pytest.mark.gw_get_radius_sessions | ||||||
|  |     @allure.title("Get RADIUS sessions for a given AP") | ||||||
|  |     @allure.testcase(name="WIFI-12642", | ||||||
|  |                      url="https://telecominfraproject.atlassian.net/browse/WIFI-12642") | ||||||
|  |     def test_gw_service_get_radius_sessions(self, get_target_object, get_testbed_details): | ||||||
|  |         """ | ||||||
|  |             Get RADIUS sessions for a given AP | ||||||
|  |             Unique marker:pytest -m "gw_get_radius_sessions" | ||||||
|  |         """ | ||||||
|  |         device_name = get_testbed_details['device_under_tests'][0]['identifier'] | ||||||
|  |         resp = get_target_object.controller_library_object.get_radius_sessions(device_name) | ||||||
|  |         assert resp.status_code == 200 | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 jitendracandela
					jitendracandela