mirror of
https://github.com/Telecominfraproject/wlan-testing.git
synced 2025-12-25 15:07:18 +00:00
Adding new Jira links and Descriptions
Signed-off-by: Rajendra <rajendra.pappu@candelatech.com>
This commit is contained in:
@@ -46,9 +46,13 @@ class TestDFSChannel52Bw80(object):
|
||||
@pytest.mark.wpa2_personal
|
||||
@pytest.mark.fiveg
|
||||
@pytest.mark.dfs_channel_52_bw_80
|
||||
@allure.title("Test for Channel 52 and bandwidth 80")
|
||||
@allure.title("Verify DFS Test of Channel 52 and Bandwidth 80MHz in 5GHz Band")
|
||||
def test_dfs_channel_52_bw_80(self, get_test_library, get_dut_logs_per_test_case, get_test_device_logs,
|
||||
num_stations, setup_configuration, check_connectivity, get_target_object):
|
||||
"""
|
||||
To verify that a 5G client operating on channel 52 shifts to a non-DFS channel if radar is detected
|
||||
Unique Marker: pytest -m "bandwidth_80MHz and ow_sanity_lf and dfs_channel_52_bw_80"
|
||||
"""
|
||||
profile_data = setup_params_general1["ssid_modes"]["wpa2_personal"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security_key = profile_data["security_key"]
|
||||
@@ -99,9 +103,13 @@ class TestDFSChannel100Bw80(object):
|
||||
@pytest.mark.wpa2_personal
|
||||
@pytest.mark.fiveg
|
||||
@pytest.mark.dfs_channel_100_bw_80
|
||||
@allure.title("Test for Channel 100 and bandwidth 80")
|
||||
@allure.title("Verify DFS Test of Channel 100 and Bandwidth 80MHz in 5GHz Band")
|
||||
def test_dfs_channel_100_bw_80(self, get_test_library, get_dut_logs_per_test_case, get_test_device_logs,
|
||||
num_stations, setup_configuration, check_connectivity, get_target_object):
|
||||
"""
|
||||
To verify that a 5G client operating on channel 100 shifts to a non-DFS channel if radar is detected
|
||||
Unique Marker: pytest -m "bandwidth_80MHz and ow_sanity_lf and dfs_channel_100_bw_80"
|
||||
"""
|
||||
profile_data = setup_params_general2["ssid_modes"]["wpa2_personal"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security_key = profile_data["security_key"]
|
||||
@@ -152,9 +160,14 @@ class TestDFSChannel132Bw80(object):
|
||||
@pytest.mark.wpa2_personal
|
||||
@pytest.mark.fiveg
|
||||
@pytest.mark.dfs_channel_132_bw_80
|
||||
@allure.title("Test for Channel 132 and bandwidth 80")
|
||||
@allure.title("Verify DFS Test of Channel 132 and Bandwidth 80MHz in 5GHz Band")
|
||||
def test_dfs_channel_132_bw_80(self, get_test_library, get_dut_logs_per_test_case, get_test_device_logs,
|
||||
num_stations, setup_configuration, check_connectivity, get_target_object):
|
||||
"""
|
||||
To verify that a 5G client operating on channel 132 shifts to a non-DFS channel if radar is detected
|
||||
Unique Marker: pytest -m "bandwidth_80MHz and ow_sanity_lf and dfs_channel_132_bw_80"
|
||||
|
||||
"""
|
||||
profile_data = setup_params_general11["ssid_modes"]["wpa2_personal"][0]
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security_key = profile_data["security_key"]
|
||||
|
||||
@@ -40,13 +40,15 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.title("Test for wpa enterprise 2.4 GHz")
|
||||
@allure.title("Bridge Mode Client Connectivity Test with WPA-Enterprise-TLS in 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-3742", name="WIFI-3742")
|
||||
def test_tls_wpa_enterprise_2g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
To verify that a client created on 2G radio connects to AP in Bridge mode with WPA enterprise TLS security
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa_enterprise and ow_sanity_lf and tls and bridge and twog"
|
||||
"""
|
||||
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa_eap_2g", "appliedRadios": ["2G"], "security_key": "something"}
|
||||
@@ -73,13 +75,15 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@allure.title("Test for wpa enterprise 5 GHz")
|
||||
@allure.title("Bridge Mode Client Connectivity Test with WPA-Enterprise-TLS in 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-3743", name="WIFI-3743")
|
||||
def test_tls_wpa_enterprise_5g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
To verify that a client created on 5G radio connects to AP in Bridge mode with WPA enterprise TLS security
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa_enterprise and ow_sanity_lf and tls and bridge and fiveg"
|
||||
"""
|
||||
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa_eap_5g", "appliedRadios": ["5G"], "security_key": "something"}
|
||||
@@ -106,13 +110,15 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.title("Test for wpa2 enterprise 2.4 GHz")
|
||||
@allure.title("Bridge Mode Client Connectivity Test with WPA2-Enterprise-TLS in 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-3739", name="WIFI-3739")
|
||||
def test_tls_wpa2_enterprise_2g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and bridge and enterprise and tls and twog"
|
||||
"""
|
||||
To verify that a client created on 2G radio connects to AP in Bridge mode with WPA2 enterprise TLS security
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa2_enterprise and ow_sanity_lf and tls and bridge and twog"
|
||||
"""
|
||||
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa2_eap_2g", "appliedRadios": ["2G"], "security_key": "something"}
|
||||
@@ -137,13 +143,15 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@allure.title("Test for wpa2 enterprise 5 GHz")
|
||||
@allure.title("Bridge Mode Client Connectivity Test with WPA2-Enterprise-TLS in 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-3713", name="WIFI-3713")
|
||||
def test_tls_wpa2_enterprise_5g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
To verify that a client created on 5G radio connects to AP in Bridge mode with WAP2 enterprise TLS security
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa2_enterprise and ow_sanity_lf and tls and bridge and fiveg"
|
||||
"""
|
||||
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa2_eap_5g", "appliedRadios": ["5G"], "security_key": "something"}
|
||||
@@ -168,13 +176,15 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.title("Test for wpa3 enterprise 2.4 GHz")
|
||||
@allure.title("Bridge Mode Client Connectivity Test with WPA3-Enterprise-TLS in 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-3736", name="WIFI-3736")
|
||||
def test_tls_wpa3_enterprise_2g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
To verify that a client created on 2G radio connects to AP in Bridge mode with WPA3 enterprise TLS security
|
||||
Unique Marker: pytest -m "To verify that a client created on 2G radio connects to AP in Bridge mode with WPA3 enterprise TLS security"
|
||||
"""
|
||||
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa3_eap_2g", "appliedRadios": ["2G"], "security_key": "something"}
|
||||
@@ -199,13 +209,15 @@ class TestBridgeModeEnterpriseTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@allure.title("Test for wpa3 enterprise 5 GHz")
|
||||
@allure.title("Bridge Mode Client Connectivity Test with WPA3-Enterprise-TLS in 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-3734", name="WIFI-3734")
|
||||
def test_tls_wpa3_enterprise_5g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 5g
|
||||
pytest -m "client_connectivity_tests and bridge and enterprise and tts and twog"
|
||||
"""
|
||||
To verify that a client created on 5G radio connects to AP in Bridge mode with WPA3 enterprise TLS security
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa3_enterprise and ow_sanity_lf and tls and bridge and fiveg"
|
||||
"""
|
||||
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa3_eap_5g", "appliedRadios": ["5G"], "security_key": "something"}
|
||||
@@ -262,13 +274,15 @@ class TestBridgeModeEnterpriseTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.title("Test for wpa wpa2 enterprise 2.4 GHz")
|
||||
@allure.title("Bridge Mode Client Connectivity Test with WAP-WPA2-Enterprise-TLS in 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10589", name="WIFI-10589")
|
||||
def test_wpa_wpa2_enterprise_2g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and twog"
|
||||
"""
|
||||
To verify that a client created on 2G radio connects to AP in Bridge mode with WAP-WPA2-Enterprise TLS security
|
||||
Unique Marker: pytest -m "client_connectivity_tests and wpa_wpa2_enterprise_mixed and enterprise and ow_sanity_lf and tls and bridge and twog"
|
||||
"""
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa_wpa2_eap_2g", "appliedRadios": ["2G"]}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
@@ -290,14 +304,16 @@ class TestBridgeModeEnterpriseTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
@allure.title("Test for wpa wpa2 enterprise 5 GHz")
|
||||
@allure.title("Bridge Mode Client Connectivity Test with WAP-WPA2-Enterprise-TLS in 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10590", name="WIFI-10590")
|
||||
def test_wpa_wpa2_enterprise_5g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and bridge and enterprise and ttls and wpa_wpa2_enterprise_mixed and fiveg"
|
||||
"""
|
||||
To verify that a client created on 5G radio connects to AP in Bridge mode with WAP-WPA2-Enterprise TLS security
|
||||
Unique Marker: pytest -m "client_connectivity_tests and wpa_wpa2_enterprise_mixed and enterprise and ow_sanity_lf and tls and bridge and fiveg"
|
||||
"""
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa_wpa2_eap_5g", "appliedRadios": ["5G"]}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
@@ -318,14 +334,16 @@ class TestBridgeModeEnterpriseTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.title("Test for wpa3 enterprise mixed 2.4 GHz")
|
||||
@allure.title("Bridge Mode Client Connectivity Test with WAP3-Enterprise-Mixed-TLS in 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10591", name="WIFI-10591")
|
||||
def test_wpa3_enterprise_mixed_2g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and bridge and enterprise and ttls and wpa3_enterprise_mixed and twog"
|
||||
"""
|
||||
To verify that a client created on 2G radio connects to AP in Bridge mode with WAP3-Enterprise-Mixed TLS security
|
||||
Unique Marker: pytest -m "client_connectivity_tests and wpa3_enterprise_mixed and enterprise and ow_sanity_lf and tls and bridge and twog"
|
||||
"""
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa3_mixed_eap_2g", "appliedRadios": ["2G"]}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
@@ -344,14 +362,16 @@ class TestBridgeModeEnterpriseTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
@allure.title("Test for wpa3 enterprise mixed 5 GHz")
|
||||
@allure.title("Bridge Mode Client Connectivity Test with WAP3-Enterprise-Mixed-TLS in 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10592", name="WIFI-10592")
|
||||
def test_wpa3_enterprise_mixed_5g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and bridge and enterprise and ttls and wpa3_enterprise_mixed and fiveg"
|
||||
"""
|
||||
To verify that a client created on 5G radio connects to AP in Bridge mode with WAP3-Enterprise-Mixed TLS security
|
||||
Unique Marker: pytest -m "client_connectivity_tests and wpa3_enterprise_mixed and enterprise and ow_sanity_lf and tls and bridge and fiveg"
|
||||
"""
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa3_mixed_eap_5g", "appliedRadios": ["5G"]}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
|
||||
@@ -45,7 +45,7 @@ setup_params_general = {
|
||||
}
|
||||
|
||||
|
||||
@allure.parent_suite("OpenWifi Dynamic QoS Test")
|
||||
@allure.parent_suite("OpenWifi Rate Limiting with RADIUS")
|
||||
@allure.suite("BRIDGE Mode")
|
||||
@allure.sub_suite("WPA2 Enterprise Security")
|
||||
@pytest.mark.parametrize(
|
||||
@@ -61,13 +61,17 @@ class TestRateLimitingWithRadiusBridge(object):
|
||||
@pytest.mark.twog
|
||||
@pytest.mark.ow_sanity_lf
|
||||
@pytest.mark.twog_upload_per_ssid
|
||||
@allure.title("Test for Upload per SSID 2.4 GHz")
|
||||
@allure.title("Rate Limit with RADIUS in Bridge Mode: Test Upload traffic Per-SSID on Per-Station in 2GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-5849", name="WIFI-5849")
|
||||
def test_radius_server_2g_upload_per_ssid(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, rate_radius_info,
|
||||
rate_radius_accounting_info, check_connectivity):
|
||||
"""
|
||||
To verify that rate-limiting with radius works on a clients operating on 2G radio which are running TCP upstream traffic with WAP2 Enterprise Encryption
|
||||
Unique Marker: pytest -m "wpa2_enterprise and ow_sanity_lf and twog_upload_per_ssid and bridge and twog"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_wpa2_2g_br",
|
||||
"appliedRadios": ["2G"],
|
||||
"security_key": "something",
|
||||
@@ -106,13 +110,17 @@ class TestRateLimitingWithRadiusBridge(object):
|
||||
@pytest.mark.twog
|
||||
@pytest.mark.twog_download_perssid_persta
|
||||
@pytest.mark.ow_sanity_lf
|
||||
@allure.title("Test for Download per SSID per Station 2.4GHz")
|
||||
@allure.title("Rate Limit with RADIUS in Bridge Mode: Test Download traffic Per-SSID on Per-Station in 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-5850", name="WIFI-5850")
|
||||
def test_radius_server_2g_download_perssid_persta(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, rate_radius_info,
|
||||
rate_radius_accounting_info, check_connectivity):
|
||||
"""
|
||||
To verify that rate-limiting with radius works on a clients operating on 2G radio which are running TCP downstream traffic with WAP2 Enterprise Encryption
|
||||
Unique Marker: pytest -m "wpa2_enterprise and ow_sanity_lf and twog_download_perssid_persta and bridge and twog"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_wpa2_2g_br",
|
||||
"appliedRadios": ["2G"],
|
||||
"security_key": "something",
|
||||
|
||||
@@ -35,19 +35,21 @@ setup_params_enterprise = {
|
||||
@pytest.mark.usefixtures("setup_configuration")
|
||||
class TestNATModeEnterpriseTLSSuiteA(object):
|
||||
""" SuiteA Enterprise Test Cases
|
||||
pytest -m "client_connectivity_tests and nat and enterprise and tls"
|
||||
pytest -m "client_connectivity_tests and nat and enterprise and ttls"
|
||||
"""
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.title("Test for wpa enterprise 2.4 GHz")
|
||||
@allure.title("NAT Mode Client Connectivity Test with WPA-Enterprise-TTLS in 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-3747", name="WIFI-3747")
|
||||
def test_tls_wpa_enterprise_2g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and nat and enterprise and tts and twog"
|
||||
"""
|
||||
"""
|
||||
To verify that a 2G client connects to the AP in NAT mode with WPA enterprise TTLS security will get the IP address under the specified subnet (192.168.1.1/16)
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa_enterprise and ow_sanity_lf and ttls and nat and twog"
|
||||
"""
|
||||
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa_eap_2g", "appliedRadios": ["2G"], "security_key": "something"}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
@@ -73,14 +75,16 @@ class TestNATModeEnterpriseTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@allure.title("Test for wpa enterprise 5 GHz")
|
||||
@allure.title("NAT Mode Client Connectivity Test with WPA-Enterprise-TTLS in 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-3749", name="WIFI-3749")
|
||||
def test_tls_wpa_enterprise_5g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and nat and enterprise and tts and twog"
|
||||
"""
|
||||
"""
|
||||
To verify that a 5G client connects to the AP in NAT mode with WPA enterprise TTLS security will get the IP address under the specified subnet (192.168.1.1/16)
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa_enterprise and ow_sanity_lf and ttls and nat and fiveg"
|
||||
"""
|
||||
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa_eap_5g", "appliedRadios": ["5G"], "security_key": "something"}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
@@ -106,14 +110,16 @@ class TestNATModeEnterpriseTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.title("Test for wpa2 enterprise 2.4 GHz")
|
||||
@allure.title("NAT Mode Client Connectivity Test with WPA2-Enterprise-TTLS in 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-3753", name="WIFI-3753")
|
||||
def test_tls_wpa2_enterprise_2g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and nat and enterprise and tls and twog"
|
||||
"""
|
||||
"""
|
||||
To verify that a 2G client connects to the AP in NAT mode with WPA2 enterprise TTLS security will get the IP address under the specified subnet (192.168.1.1/16)
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa2_enterprise and ow_sanity_lf and ttls and nat and twog"
|
||||
"""
|
||||
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa2_eap_2g", "appliedRadios": ["2G"], "security_key": "something"}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
@@ -137,14 +143,16 @@ class TestNATModeEnterpriseTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@allure.title("Test for wpa2 enterprise 5 GHz")
|
||||
@allure.title("NAT Mode Client Connectivity Test with WPA2-Enterprise-TTLS in 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-3752", name="WIFI-3752")
|
||||
def test_tls_wpa2_enterprise_5g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and nat and enterprise and tts and twog"
|
||||
"""
|
||||
"""
|
||||
To verify that a 5G client connects to the AP in NAT mode with WPA2 enterprise TTLS security will get the IP address under the specified subnet (192.168.1.1/16)
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa_enterprise and ow_sanity_lf and ttls and nat and fiveg"
|
||||
"""
|
||||
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa2_eap_5g", "appliedRadios": ["5G"], "security_key": "something"}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
@@ -168,14 +176,16 @@ class TestNATModeEnterpriseTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.title("Test for wpa3 enterprise 2.4 GHz")
|
||||
@allure.title("NAT Mode Client Connectivity Test with WPA3-Enterprise-TTLS in 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10585", name="WIFI-10585")
|
||||
def test_tls_wpa3_enterprise_2g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and nat and enterprise and tts and twog"
|
||||
"""
|
||||
"""
|
||||
To verify that a 2G client connects to the AP in NAT mode with WPA3 enterprise TTLS security will get the IP address under the specified subnet (192.168.1.1/16)
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa3_enterprise and ow_sanity_lf and ttls and nat and twog"
|
||||
"""
|
||||
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa3_eap_2g", "appliedRadios": ["2G"], "security_key": "something"}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
@@ -199,14 +209,16 @@ class TestNATModeEnterpriseTLSSuiteA(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@allure.title("Test for wpa3 enterprise 5 GHz")
|
||||
@allure.title("NAT Mode Client Connectivity Test with WPA3-Enterprise-TTLS in 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10586", name="WIFI-10586")
|
||||
def test_tls_wpa3_enterprise_5g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 5g
|
||||
pytest -m "client_connectivity_tests and nat and enterprise and tts and twog"
|
||||
"""
|
||||
"""
|
||||
To verify that a 5G client connects to the AP in NAT mode with WPA3 enterprise TTLS security will get the IP address under the specified subnet (192.168.1.1/16)
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa3_enterprise and ow_sanity_lf and ttls and nat and fiveg"
|
||||
"""
|
||||
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa3_eap_5g", "appliedRadios": ["5G"], "security_key": "something"}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
@@ -262,14 +274,16 @@ class TestNATModeEnterpriseTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.title("Test for wpa wpa2 enterprise 2.4 GHz")
|
||||
@allure.title("NAT Mode Client Connectivity Test with WAP-WPA2-Enterprise-Mixed-TTLS in 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10587", name="WIFI-10587")
|
||||
def test_wpa_wpa2_enterprise_2g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and NAT and enterprise and ttls and wpa_wpa2_enterprise_mixed and twog"
|
||||
"""
|
||||
To verify that a 2G client connects to the AP in NAT mode with WAP-WPA2 Enterprise-Mixed TTLS security will get the IP address under the specified subnet (192.168.1.1/16)
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa_wpa2_enterprise_mixed and ow_sanity_lf and ttls and nat and twog"
|
||||
"""
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa_wpa2_eap_2g", "appliedRadios": ["2G"]}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
@@ -291,13 +305,16 @@ class TestNATModeEnterpriseTLSSuiteTwo(object):
|
||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
@allure.title("Test for wpa wpa2 enterprise 5 GHz")
|
||||
@allure.title("NAT Mode Client Connectivity Test with WAP-WPA2-Enterprise-Mixed-TTLS in 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10588", name="WIFI-10588")
|
||||
def test_wpa_wpa2_enterprise_5g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and nat and enterprise and ttls and wpa_wpa2_enterprise_mixed and fiveg"
|
||||
"""
|
||||
To verify that a 5G client connects to the AP in NAT mode with WAP-WPA2 Enterprise-Mixed TTLS security will get the IP address under the specified subnet (192.168.1.1/16)
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa_wpa2_enterprise_mixed and ow_sanity_lf and ttls and nat and fiveg"
|
||||
"""
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa_wpa2_eap_5g", "appliedRadios": ["5G"]}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa"
|
||||
@@ -318,14 +335,16 @@ class TestNATModeEnterpriseTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.title("Test for wpa3 enterprise mixed 2.4 GHz")
|
||||
@allure.title("NAT Mode Client Connectivity Test with WPA3-Enterprise-Mixed-TTLS in 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-3900", name="WIFI-3900")
|
||||
def test_wpa3_enterprise_mixed_2g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and nat and enterprise and ttls and wpa3_enterprise_mixed and twog"
|
||||
"""
|
||||
To verify that a 2G client connects to the AP in NAT mode with WPA3 Enterprise-Mixed TTLS security will get the IP address under the specified subnet (192.168.1.1/16)
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa3_enterprise_mixed and ow_sanity_lf and ttls and nat and twog"
|
||||
"""
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa3_mixed_eap_2g", "appliedRadios": ["2G"]}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
@@ -344,14 +363,16 @@ class TestNATModeEnterpriseTLSSuiteTwo(object):
|
||||
|
||||
@pytest.mark.wpa3_enterprise_mixed
|
||||
@pytest.mark.fiveg
|
||||
@allure.title("Test for wpa3 enterprise mixed 5 GHz")
|
||||
@allure.title("NAT Mode Client Connectivity Test with WPA3-Enterprise-Mixed-TTLS in 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-3901", name="WIFI-3901")
|
||||
def test_wpa3_enterprise_mixed_5g(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
get_target_object,
|
||||
num_stations, setup_configuration, check_connectivity, radius_info):
|
||||
""" wpa enterprise 2g
|
||||
pytest -m "client_connectivity_tests and nat and enterprise and ttls and wpa3_enterprise_mixed and fiveg"
|
||||
"""
|
||||
To verify that a 5G client connects to the AP in NAT mode with WPA3 Enterprise-Mixed TTLS security will get the IP address under the specified subnet (192.168.1.1/16)
|
||||
Unique Marker: pytest -m "client_connectivity_tests and enterprise and wpa3_enterprise_mixed and ow_sanity_lf and ttls and nat and fiveg"
|
||||
"""
|
||||
profile_data = {"ssid_name": "tls_ssid_wpa3_mixed_eap_5g", "appliedRadios": ["5G"]}
|
||||
ssid_name = profile_data["ssid_name"]
|
||||
security = "wpa3"
|
||||
|
||||
@@ -46,14 +46,14 @@ class TestVLANModeConnectivitySuiteA(object):
|
||||
@pytest.mark.open
|
||||
@pytest.mark.twog
|
||||
@allure.story('OPEN 2.4 GHZ Band')
|
||||
@allure.title("VLAN Mode Client Connectivity Test with open encryption 2.4 GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-2809", name="JIRA LINK")
|
||||
@allure.title("VLAN Mode Client Connectivity Test with Open Encryption 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10608", name="WIFI-10608")
|
||||
def test_vlan_open_2g_client_connectivity(self, get_test_library, num_stations, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
check_connectivity, setup_configuration):
|
||||
"""
|
||||
VLAN Mode Client Connectivity Test with open encryption 2.4 GHz Band
|
||||
pytest -m "client_connectivity_tests and vlan and general and open and twog"
|
||||
To verify that a client created on 2G radio connects to AP in VLAN mode (i.e VLAN-100) with open authentication
|
||||
Unique Marker: pytest -m "client_connectivity_tests and vlan and general and open and twog"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_open_2g_vlan", "appliedRadios": ["2G"], "security_key": "something",
|
||||
"vlan": 100}
|
||||
@@ -73,14 +73,14 @@ class TestVLANModeConnectivitySuiteA(object):
|
||||
@pytest.mark.open
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('OPEN 5 GHZ Band')
|
||||
@allure.title("VLAN Mode Client Connectivity Test with open encryption 5 GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-2801", name="JIRA LINK")
|
||||
@allure.title("VLAN Mode Client Connectivity Test with Open Encryption 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10622", name="WIFI-10622")
|
||||
def test_vlan_open_5g_client_connectivity(self, get_test_library, num_stations, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
check_connectivity, setup_configuration):
|
||||
"""
|
||||
VLAN Mode Client Connectivity Test with open encryption 5 GHz Band
|
||||
pytest -m "client_connectivity_tests and vlan and general and open and fiveg"
|
||||
To verify that a client created on 5G radio connects to AP in VLAN mode (VLAM-100) with open authentication
|
||||
Unique Marker: pytest -m "client_connectivity_tests and vlan and general and open and fiveg"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_open_5g_vlan", "appliedRadios": ["5G"], "security_key": "something",
|
||||
"vlan": 100}
|
||||
@@ -102,14 +102,14 @@ class TestVLANModeConnectivitySuiteA(object):
|
||||
@pytest.mark.wpa
|
||||
@pytest.mark.twog
|
||||
@allure.story('wpa 2.4 GHZ Band')
|
||||
@allure.title("VLAN Mode Client Connectivity Test with wpa encryption 2.4 GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-2801", name="JIRA LINK")
|
||||
@allure.title("VLAN Mode Client Connectivity Test with WPA Encryption 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-2125", name="WIFI-2125")
|
||||
def test_vlan_wpa_2g_client_connectivity(self, get_test_library, num_stations, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
check_connectivity, setup_configuration):
|
||||
"""
|
||||
VLAN Mode Client Connectivity Test with wpa encryption 2.4 GHz Band
|
||||
pytest -m "client_connectivity_tests and vlan and general and wpa and twog"
|
||||
To verify that a client created on 2G radio connects to AP in VLAN mode (i.e VLAN-100) with WPA personal authentication
|
||||
Unique Marker: pytest -m "client_connectivity_tests and vlan and general and wpa and twog"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_wpa_2g_vlan", "appliedRadios": ["2G"], "security_key": "something",
|
||||
"vlan": 100}
|
||||
@@ -129,13 +129,14 @@ class TestVLANModeConnectivitySuiteA(object):
|
||||
@pytest.mark.wpa
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('wpa 5 GHZ Band')
|
||||
@allure.title("VLAN Mode Client Connectivity Test with wpa encryption 5 GHz Band")
|
||||
@allure.title("VLAN Mode Client Connectivity Test with WPA Encryption 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-2134", name="WIFI-2134")
|
||||
def test_vlan_wpa_5g_client_connectivity(self, get_test_library, num_stations, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
check_connectivity, setup_configuration):
|
||||
"""
|
||||
VLAN Mode Client Connectivity Test with wpa encryption 5 GHz Band
|
||||
pytest -m "client_connectivity_tests and vlan and general and wpa and fiveg"
|
||||
To verify that a client created on 5G radio connects to AP in VLAN mode (i.e VLAN-100) with WPA authentication
|
||||
Unique Marker: pytest -m "client_connectivity_tests and vlan and general and wpa and fiveg"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_wpa_5g_vlan", "appliedRadios": ["5G"], "security_key": "something",
|
||||
"vlan": 100}
|
||||
@@ -155,13 +156,14 @@ class TestVLANModeConnectivitySuiteA(object):
|
||||
@pytest.mark.wpa2_personal
|
||||
@pytest.mark.twog
|
||||
@allure.story('wpa2_personal 2.4 GHZ Band')
|
||||
@allure.title("VLAN Mode Client Connectivity Test with wpa2_personal encryption 2.4 GHz Band")
|
||||
@allure.title("VLAN Mode Client Connectivity Test with WPA2-Personal Encryption 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-2124", name="WIFI-2124")
|
||||
def test_vlan_wpa2_personal_2g_client_connectivity(self, get_test_library, num_stations, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
check_connectivity, setup_configuration):
|
||||
"""
|
||||
VLAN Mode Client Connectivity Test with wpa2_personal encryption 2.4 GHz Band
|
||||
pytest -m "client_connectivity_tests and vlan and general and wpa2_personal and twog"
|
||||
To verify that a client created on 2G radio connects to AP in VLAN mode with WPA2-Personal authentication
|
||||
Unique Marker: pytest -m "client_connectivity_tests and vlan and general and wpa2_personal and twog"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_wpa2_2g_vlan", "appliedRadios": ["2G"], "security_key": "something",
|
||||
"vlan": 100}
|
||||
@@ -183,13 +185,14 @@ class TestVLANModeConnectivitySuiteA(object):
|
||||
@pytest.mark.wpa2_personal
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('wpa2_personal 5 GHZ Band')
|
||||
@allure.title("VLAN Mode Client Connectivity Test with wpa2_personal encryption 5 GHz Band")
|
||||
@allure.title("VLAN Mode Client Connectivity Test with WPA2-Personal Encryption 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-2140", name="WIFI-2140")
|
||||
def test_vlan_wpa2_personal_5g_client_connectivity(self, get_test_library, num_stations, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
check_connectivity, setup_configuration):
|
||||
"""
|
||||
VLAN Mode Client Connectivity Test with wpa2_personal encryption 5 GHz Band
|
||||
pytest -m "client_connectivity_tests and vlan and general and wpa2_personal and fiveg"
|
||||
To verify that a client created on 5G radio connects to AP in VLAN mode (i.e VLAN-100) with WPA2-Personal authentication
|
||||
Unique Marker: pytest -m "client_connectivity_tests and vlan and general and wpa2_personal and fiveg"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_wpa2_5g_vlan", "appliedRadios": ["5G"], "security_key": "something",
|
||||
"vlan": 100}
|
||||
@@ -249,13 +252,14 @@ class TestVLANModeConnectivitySuiteTwo(object):
|
||||
@pytest.mark.wpa3_personal
|
||||
@pytest.mark.twog
|
||||
@allure.story('wpa3_personal 2.4 GHZ Band')
|
||||
@allure.title("VLAN Mode Client Connectivity Test with wpa3_personal encryption 2.4 GHz Band")
|
||||
@allure.title("VLAN Mode Client Connectivity Test with WPA3-Personal Encryption 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10627", name="WIFI-10627")
|
||||
def test_vlan_wpa3_personal_2g_client_connectivity(self, get_test_library, num_stations, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
check_connectivity, setup_configuration):
|
||||
"""
|
||||
VLAN Mode Client Connectivity Test with wpa3_personal encryption 2.4 GHz Band
|
||||
pytest -m "client_connectivity_tests and vlan and general and wpa3_personal and twog"
|
||||
To verify that a client created on 2G radio connects to AP in VLAN mode (i.e VLAN-100) with WPA3-Personal authentication
|
||||
Unique Marker: pytest -m "client_connectivity_tests and vlan and general and wpa3_personal and twog"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_wpa3_p_2g_vlan", "appliedRadios": ["2G"], "security_key": "something",
|
||||
"vlan": 100}
|
||||
@@ -275,13 +279,14 @@ class TestVLANModeConnectivitySuiteTwo(object):
|
||||
@pytest.mark.wpa3_personal
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('wpa3_personal 5 GHZ Band')
|
||||
@allure.title("VLAN Mode Client Connectivity Test with wpa3_personal encryption 5 GHz Band")
|
||||
@allure.title("VLAN Mode Client Connectivity Test with WPA3-Personal Encryption 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10629", name="WIFI-10629")
|
||||
def test_vlan_wpa3_personal_5g_client_connectivity(self, get_test_library, num_stations, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
check_connectivity, setup_configuration):
|
||||
"""
|
||||
VLAN Mode Client Connectivity Test with wpa3_personal encryption 5 GHz Band
|
||||
pytest -m "client_connectivity_tests and vlan and general and wpa3_personal and fiveg"
|
||||
To verify that a client created on 5G radio connects to AP in VLAN mode (i.e VLAN-100) with WPA3-Personal authentication
|
||||
Unique Marker: pytest -m "client_connectivity_tests and vlan and general and wpa3_personal and fiveg"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_wpa3_p_5g_vlan", "appliedRadios": ["5G"], "security_key": "something",
|
||||
"vlan": 100}
|
||||
@@ -301,13 +306,14 @@ class TestVLANModeConnectivitySuiteTwo(object):
|
||||
@pytest.mark.wpa3_personal
|
||||
@pytest.mark.sixg
|
||||
@allure.story('wpa3_personal 6 GHZ Band')
|
||||
@allure.title("VLAN Mode Client Connectivity Test with wpa3_personal encryption 6 GHz Band")
|
||||
@allure.title("VLAN Mode Client Connectivity Test with WPA3-Personal Encryption 6GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10764", name="WIFI-10764")
|
||||
def test_vlan_wpa3_personal_6g_client_connectivity(self, get_test_library, num_stations, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
check_connectivity, setup_configuration):
|
||||
"""
|
||||
VLAN Mode Client Connectivity Test with wpa3_personal encryption 6 GHz Band
|
||||
pytest -m "client_connectivity_tests and vlan and general and wpa3_personal and sixg"
|
||||
To verify that a client created on 6G radio connects to AP in VLAN mode (i.e VLAN-100) with WPA3-Personal authentication
|
||||
Unique Marker: pytest -m "client_connectivity_tests and vlan and general and wpa3_personal and sixg"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_wpa3_p_6g_vlan", "appliedRadios": ["6G"], "security_key": "something",
|
||||
"vlan": 100}
|
||||
@@ -327,14 +333,15 @@ class TestVLANModeConnectivitySuiteTwo(object):
|
||||
@pytest.mark.wpa3_personal_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.story('wpa3_personal_mixed 2.4 GHZ Band')
|
||||
@allure.title("VLAN Mode Client Connectivity Test with wpa3_personal_mixed encryption 2.4 GHz Band")
|
||||
@allure.title("VLAN Mode Client Connectivity Test with WPA3-Personal-Mixed Encryption 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10630", name="WIFI-10630")
|
||||
def test_vlan_wpa3_personal_mixed_2g_client_connectivity(self, get_test_library,
|
||||
num_stations, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
check_connectivity, setup_configuration):
|
||||
"""
|
||||
VLAN Mode Client Connectivity Test with wpa3_personal_mixed encryption 2.4 GHz Band
|
||||
pytest -m "client_connectivity_tests and vlan and general and wpa3_personal_mixed and twog"
|
||||
To verify that a client created on 2G radio connects to AP in VLAN mode (i.e VLAN-100) with WPA3-Personal-Mixed authentication
|
||||
Unique Marker: pytest -m "client_connectivity_tests and vlan and general and wpa3_personal_mixed and twog"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_wpa3_p_m_2g_vlan", "appliedRadios": ["2G"], "security_key": "something",
|
||||
"vlan": 100}
|
||||
@@ -354,14 +361,15 @@ class TestVLANModeConnectivitySuiteTwo(object):
|
||||
@pytest.mark.wpa3_personal_mixed
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('wpa3_personal_mixed 5 GHZ Band')
|
||||
@allure.title("VLAN Mode Client Connectivity Test with wpa3_personal_mixed encryption 5 GHz Band")
|
||||
@allure.title("VLAN Mode Client Connectivity Test with WPA3-Personal-Mixed Encryption 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10631", name="WIFI-10631")
|
||||
def test_vlan_wpa3_personal_mixed_5g_client_connectivity(self, get_test_library,
|
||||
num_stations, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
check_connectivity, setup_configuration):
|
||||
"""
|
||||
VLAN Mode Client Connectivity Test with wpa3_personal_mixed encryption 5 GHz Band
|
||||
pytest -m "client_connectivity_tests and vlan and general and wpa3_personal_mixed and fiveg"
|
||||
To verify that a client created on 5G radio connects to AP in VLAN mode (i.e VLAN-100) with WPA3-Personal-Mixed authentication
|
||||
Unique Marker: pytest -m "client_connectivity_tests and vlan and general and wpa3_personal_mixed and fiveg"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_wpa3_p_m_5g_vlan", "appliedRadios": ["5G"], "security_key": "something",
|
||||
"vlan": 100}
|
||||
@@ -381,14 +389,15 @@ class TestVLANModeConnectivitySuiteTwo(object):
|
||||
@pytest.mark.wpa_wpa2_personal_mixed
|
||||
@pytest.mark.twog
|
||||
@allure.story('wpa wpa2 personal mixed 2.4 GHZ Band')
|
||||
@allure.title("VLAN Mode Client Connectivity Test with wpa_wpa2_personal_mixed encryption 2.4 GHz Band")
|
||||
@allure.title("VLAN Mode Client Connectivity Test with WPA-WPA2-Personal-Mixed Encryption 2.4GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10632", name="WIFI-10632")
|
||||
def test_vlan_wpa_wpa2_personal_mixed_2g_client_connectivity(self, get_test_library,
|
||||
num_stations, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
check_connectivity, setup_configuration):
|
||||
"""
|
||||
VLAN Mode Client Connectivity Test with wpa_wpa2_personal_mixed encryption 2.4 GHz Band
|
||||
pytest -m "client_connectivity_tests and vlan and general and wpa_wpa2_personal_mixed and twog"
|
||||
To verify that a client created on 2G radio connects to AP in VLAN mode (i.e VLAN-100) with WPA-WPA2-Personal-Mixed authentication
|
||||
Unique Marker: pytest -m "client_connectivity_tests and vlan and general and wpa_wpa2_personal_mixed and twog"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_wpa_wpa2_p_m_2g_vlan", "appliedRadios": ["2G"], "security_key": "something",
|
||||
"vlan": 100}
|
||||
@@ -410,14 +419,15 @@ class TestVLANModeConnectivitySuiteTwo(object):
|
||||
@pytest.mark.wpa_wpa2_personal_mixed
|
||||
@pytest.mark.fiveg
|
||||
@allure.story('wpa wpa2 personal mixed 5 GHZ Band')
|
||||
@allure.title("VLAN Mode Client Connectivity Test with wpa_wpa2_personal_mixed encryption 5 GHz Band")
|
||||
@allure.title("VLAN Mode Client Connectivity Test with WPA-WPA2-Personal-Mixed Encryption 5GHz Band")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-10633", name="WIFI-10633")
|
||||
def test_vlan_wpa_wpa2_personal_mixed_5g_client_connectivity(self, get_test_library,
|
||||
num_stations, get_dut_logs_per_test_case,
|
||||
get_test_device_logs,
|
||||
check_connectivity, setup_configuration):
|
||||
"""
|
||||
VLAN Mode Client Connectivity Test with wpa_wpa2_personal_mixed encryption 5 GHz Band
|
||||
pytest -m "client_connectivity_tests and vlan and general and wpa_wpa2_personal_mixed and fiveg"
|
||||
To verify that a client created on 5G radio connects to AP in VLAN mode (i.e VLAN-100) with WPA-WPA2-Personal-Mixed authentication
|
||||
Unique Marker: pytest -m "client_connectivity_tests and vlan and general and wpa_wpa2_personal_mixed and fiveg"
|
||||
"""
|
||||
profile_data = {"ssid_name": "ssid_wpa_wpa2_p_m_5g_vlan", "appliedRadios": ["5G"], "security_key": "something",
|
||||
"vlan": 100}
|
||||
|
||||
@@ -50,13 +50,13 @@ class TestDynamicVlanOverSsid2GWpa2(object):
|
||||
@pytest.mark.dynamic_precedence_over_ssid
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.testcase(name="test_dynamic_precedence_over_ssid_vlan",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-5705")
|
||||
@allure.title("Test for dynamic precedence over ssid")
|
||||
@allure.title("Verify that Dynamic VLAN takes precedence over configured SSID VLAN")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-5705", name="WIFI-5705")
|
||||
def test_dynamic_precedence_over_ssid_vlan_2g_wpa2(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration):
|
||||
"""
|
||||
pytest -m "dynamic_precedence_over_ssid and wpa2_enterprise and vlan"
|
||||
To Verify that Dynamic VLAN takes precedence over configured SSID VLAN
|
||||
Unique Marker: pytest -m "dynamic_precedence_over_ssid and wpa2_enterprise and vlan"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"]
|
||||
|
||||
@@ -51,13 +51,13 @@ class TestDynamicVlan2GWpa2(object):
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
@pytest.mark.ow_sanity_lf
|
||||
@allure.testcase(name="test_ssid_vlan_in_the_absence_of_radius_vlan_identifier",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-5704")
|
||||
@allure.title("Test for ssid vlan in the absence of radius vlan identifier")
|
||||
@allure.title("Verify that SSID VLAN is used in the absence of radius VLAN tunnel type identifiers")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-5704", name="WIFI-5704")
|
||||
def test_ssid_vlan_in_the_absence_of_radius_vlan_identifier_2g_wpa2(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration):
|
||||
"""
|
||||
pytest -m " absence_of_radius_vlan_identifier and wpa2_enterprise and vlan"
|
||||
To verify that SSID VLAN is used in the absence of radius VLAN tunnel type identifiers
|
||||
Unique Marker: pytest -m " absence_of_radius_vlan_identifier and wpa2_enterprise and vlan"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"]
|
||||
|
||||
Reference in New Issue
Block a user