mirror of
https://github.com/Telecominfraproject/wlan-testing.git
synced 2025-11-07 14:27:50 +00:00
wpa3 eap nat mode fixes
Signed-off-by: shivamcandela <shivam.thakur@candelatech.com>
This commit is contained in:
@@ -148,10 +148,36 @@ class APNOS:
|
|||||||
info.append(":".join(mac_info_list).replace("'", ""))
|
info.append(":".join(mac_info_list).replace("'", ""))
|
||||||
if ssid[0].split(":")[0] == "b'security":
|
if ssid[0].split(":")[0] == "b'security":
|
||||||
security = ssid[0].split(":")[1].split(",")[2].replace("]", "").replace('"', "").replace("'", "")
|
security = ssid[0].split(":")[1].split(",")[2].replace("]", "").replace('"', "").replace("'", "")
|
||||||
info.append(security)
|
print(ssid[0].split(":")[1])
|
||||||
if security != "OPEN":
|
if security != "OPEN":
|
||||||
|
if security == "WPA-PSK":
|
||||||
|
if ssid[0].split(":")[1].split(",")[6].__contains__("1"):
|
||||||
|
info.append("WPA")
|
||||||
|
security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
|
||||||
|
if ssid[0].split(":")[1].split(",")[6].__contains__("2"):
|
||||||
|
info.append("WPA2")
|
||||||
|
security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
|
||||||
|
if ssid[0].split(":")[1].split(",")[6].__contains__("mixed"):
|
||||||
|
info.append("WPA | WPA2")
|
||||||
|
security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
|
||||||
|
if security == "WPA-SAE":
|
||||||
|
if ssid[0].split(":")[1].split(",")[6].__contains__("3"):
|
||||||
|
info.append("WPA3_PERSONAL")
|
||||||
|
security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
|
||||||
|
if ssid[0].split(":")[1].split(",")[6].__contains__("mixed"):
|
||||||
|
info.append("WPA3_PERSONAL")
|
||||||
|
security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
|
||||||
|
if security == "WPA-EAP":
|
||||||
|
info.append("EAP-TTLS")
|
||||||
|
security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
|
||||||
|
if security == "WPA3-EAP":
|
||||||
|
info.append("EAP-TTLS")
|
||||||
|
security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
|
||||||
|
else:
|
||||||
security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
|
security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
|
||||||
info.append(security_key)
|
info.append(security_key)
|
||||||
|
else:
|
||||||
|
info.append("OPEN")
|
||||||
if ssid[0].split(":")[0] == "b'ssid":
|
if ssid[0].split(":")[0] == "b'ssid":
|
||||||
info.append(ssid[0].split(":")[1].replace("'", ""))
|
info.append(ssid[0].split(":")[1].replace("'", ""))
|
||||||
ssid_info_list.append(info)
|
ssid_info_list.append(info)
|
||||||
@@ -255,7 +281,6 @@ class APNOS:
|
|||||||
return redirector
|
return redirector
|
||||||
|
|
||||||
def run_generic_command(self, cmd=""):
|
def run_generic_command(self, cmd=""):
|
||||||
allure.attach(name="run_generic_command ", body=cmd)
|
|
||||||
try:
|
try:
|
||||||
client = self.ssh_cli_connect()
|
client = self.ssh_cli_connect()
|
||||||
cmd = cmd
|
cmd = cmd
|
||||||
@@ -263,20 +288,38 @@ class APNOS:
|
|||||||
cmd = f"cd ~/cicd-git/ && ./openwrt_ctl.py {self.owrt_args} -t {self.tty} --action " \
|
cmd = f"cd ~/cicd-git/ && ./openwrt_ctl.py {self.owrt_args} -t {self.tty} --action " \
|
||||||
f"cmd --value \"{cmd}\" "
|
f"cmd --value \"{cmd}\" "
|
||||||
stdin, stdout, stderr = client.exec_command(cmd)
|
stdin, stdout, stderr = client.exec_command(cmd)
|
||||||
input = stdin.read().decode('utf-8').splitlines()
|
output = stdout.read()
|
||||||
output = stdout.read().decode('utf-8').splitlines()
|
print(output, stderr.read())
|
||||||
error = stderr.read().decode('utf-8').splitlines()
|
status = output.decode('utf-8').splitlines()
|
||||||
|
allure.attach(name="get_redirector output ", body=str(stderr))
|
||||||
|
redirector = status[1].replace(" ", "").split("|")[1]
|
||||||
client.close()
|
client.close()
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
print(e)
|
print(e)
|
||||||
allure.attach(name="run_generic_command - Exception ", body=str(e))
|
allure.attach(name="get_redirector - Exception ", body=str(e))
|
||||||
input = "Error"
|
redirector = "Error"
|
||||||
output = "Error"
|
allure.attach(name="get_redirector ", body=redirector)
|
||||||
error = "Error"
|
return redirector
|
||||||
allure.attach(name="run_generic_command ", body=input)
|
|
||||||
allure.attach(name="run_generic_command ", body=str(output))
|
def logread(self):
|
||||||
allure.attach(name="run_generic_command ", body=error)
|
try:
|
||||||
return [input, output, error]
|
client = self.ssh_cli_connect()
|
||||||
|
cmd = "logread"
|
||||||
|
if self.mode:
|
||||||
|
cmd = f"cd ~/cicd-git/ && ./openwrt_ctl.py {self.owrt_args} -t {self.tty} --action " \
|
||||||
|
f"cmd --value \"{cmd}\" "
|
||||||
|
stdin, stdout, stderr = client.exec_command(cmd)
|
||||||
|
output = stdout.read()
|
||||||
|
status = output.decode('utf-8').splitlines()
|
||||||
|
logread = status
|
||||||
|
logs = ""
|
||||||
|
for i in logread:
|
||||||
|
logs = logs + i + "\n"
|
||||||
|
client.close()
|
||||||
|
except Exception as e:
|
||||||
|
print(e)
|
||||||
|
logs = ""
|
||||||
|
return logs
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
@@ -286,7 +329,7 @@ if __name__ == '__main__':
|
|||||||
'username': "lanforge",
|
'username': "lanforge",
|
||||||
'password': "pumpkin77",
|
'password': "pumpkin77",
|
||||||
'port': 8803,
|
'port': 8803,
|
||||||
'jumphost_tty': '/dev/ttyAP1',
|
'jumphost_tty': '/dev/ttyAP2',
|
||||||
|
|
||||||
}
|
}
|
||||||
var = APNOS(credentials=obj)
|
var = APNOS(credentials=obj)
|
||||||
|
|||||||
@@ -84,7 +84,7 @@ class RunTest:
|
|||||||
self.staConnect.dut_security = security
|
self.staConnect.dut_security = security
|
||||||
self.staConnect.station_names = station_name
|
self.staConnect.station_names = station_name
|
||||||
self.staConnect.runtime_secs = 40
|
self.staConnect.runtime_secs = 40
|
||||||
self.staConnect.bringup_time_sec = 60
|
self.staConnect.bringup_time_sec = 80
|
||||||
self.staConnect.cleanup_on_exit = True
|
self.staConnect.cleanup_on_exit = True
|
||||||
# self.staConnect.cleanup()
|
# self.staConnect.cleanup()
|
||||||
self.staConnect.setup(extra_securities=extra_securities)
|
self.staConnect.setup(extra_securities=extra_securities)
|
||||||
@@ -110,7 +110,7 @@ class RunTest:
|
|||||||
mode="BRIDGE", band="twog", vlan_id=100,
|
mode="BRIDGE", band="twog", vlan_id=100,
|
||||||
station_name=[], key_mgmt="WPA-EAP",
|
station_name=[], key_mgmt="WPA-EAP",
|
||||||
pairwise="NA", group="NA", wpa_psk="DEFAULT",
|
pairwise="NA", group="NA", wpa_psk="DEFAULT",
|
||||||
ttls_passwd="nolastart",
|
ttls_passwd="nolastart", ieee80211w=1,
|
||||||
wep_key="NA", ca_cert="NA", eap="TTLS", identity="nolaradius"):
|
wep_key="NA", ca_cert="NA", eap="TTLS", identity="nolaradius"):
|
||||||
self.eap_connect = TTLSTest(host=self.lanforge_ip, port=self.lanforge_port,
|
self.eap_connect = TTLSTest(host=self.lanforge_ip, port=self.lanforge_port,
|
||||||
sta_list=station_name, vap=False, _debug_on=self.debug)
|
sta_list=station_name, vap=False, _debug_on=self.debug)
|
||||||
@@ -134,10 +134,13 @@ class RunTest:
|
|||||||
# self.eap_connect.sta_prefix = self.fiveg_prefix
|
# self.eap_connect.sta_prefix = self.fiveg_prefix
|
||||||
# self.eap_connect.resource = 1
|
# self.eap_connect.resource = 1
|
||||||
if eap == "TTLS":
|
if eap == "TTLS":
|
||||||
self.eap_connect.ieee80211w = 0
|
self.eap_connect.ieee80211w = ieee80211w
|
||||||
|
self.eap_connect.key_mgmt = key_mgmt
|
||||||
self.eap_connect.station_profile.set_command_flag("add_sta", "80211u_enable", 0)
|
self.eap_connect.station_profile.set_command_flag("add_sta", "80211u_enable", 0)
|
||||||
self.eap_connect.identity = identity
|
self.eap_connect.identity = identity
|
||||||
self.eap_connect.ttls_passwd = ttls_passwd
|
self.eap_connect.ttls_passwd = ttls_passwd
|
||||||
|
self.eap_connect.pairwise = pairwise
|
||||||
|
self.eap_connect.group = group
|
||||||
if eap == "TLS":
|
if eap == "TLS":
|
||||||
self.eap_connect.key_mgmt = "WPA-EAP-SUITE-B"
|
self.eap_connect.key_mgmt = "WPA-EAP-SUITE-B"
|
||||||
self.eap_connect.station_profile.set_command_flag("add_sta", "80211u_enable", 0)
|
self.eap_connect.station_profile.set_command_flag("add_sta", "80211u_enable", 0)
|
||||||
|
|||||||
@@ -39,6 +39,46 @@ CONFIGURATION = {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"basic-02": {
|
||||||
|
"controller": {
|
||||||
|
'url': "https://wlan-portal-svc-nola-ext-04.cicd.lab.wlan.tip.build", # API base url for the controller
|
||||||
|
'username': 'support@example.com',
|
||||||
|
'password': 'support',
|
||||||
|
'version': "1.1.0-SNAPSHOT",
|
||||||
|
'commit_date': "2021-06-01"
|
||||||
|
},
|
||||||
|
'access_point': [
|
||||||
|
{
|
||||||
|
'model': 'eap101',
|
||||||
|
'mode': 'wifi6',
|
||||||
|
'serial': '34efb6af48db',
|
||||||
|
'jumphost': True,
|
||||||
|
'ip': "localhost",
|
||||||
|
'username': "lanforge",
|
||||||
|
'password': "pumpkin77",
|
||||||
|
'port': 8803,
|
||||||
|
'jumphost_tty': '/dev/ttyAP2',
|
||||||
|
'version': "https://tip.jfrog.io/artifactory/tip-wlan-ap-firmware/eap101/dev/eap101-2021-06-15-pending-39bd8f3.tar.gz"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"traffic_generator": {
|
||||||
|
"name": "lanforge",
|
||||||
|
"details": {
|
||||||
|
"ip": "localhost",
|
||||||
|
"port": 8801,
|
||||||
|
"ssh_port": 8802,
|
||||||
|
"2.4G-Radio": ["wiphy4"],
|
||||||
|
"5G-Radio": ["wiphy5"],
|
||||||
|
"AX-Radio": ["wiphy0", "wiphy1", "wiphy2", "wiphy3"],
|
||||||
|
"upstream": "1.1.eth2",
|
||||||
|
"upstream_subnet": "10.28.2.1/24",
|
||||||
|
"uplink": "1.1.eth3",
|
||||||
|
"2.4G-Station-Name": "sta0",
|
||||||
|
"5G-Station-Name": "sta1",
|
||||||
|
"AX-Station-Name": "ax"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}, # checked
|
||||||
# This is sample Config of a Testbed
|
# This is sample Config of a Testbed
|
||||||
"basic-ext-01": {
|
"basic-ext-01": {
|
||||||
"controller": {
|
"controller": {
|
||||||
|
|||||||
@@ -122,7 +122,7 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
|
|||||||
# Radius Profile Creation
|
# Radius Profile Creation
|
||||||
if parameter["radius"]:
|
if parameter["radius"]:
|
||||||
radius_info = radius_info
|
radius_info = radius_info
|
||||||
radius_info["name"] = testbed + "-Automation-Radius-Profile-" + testbed
|
radius_info["name"] = testbed + "-Automation-Radius-Profile-" + mode
|
||||||
instantiate_profile.delete_profile_by_name(profile_name=testbed + "-Automation-Radius-Profile-" + mode)
|
instantiate_profile.delete_profile_by_name(profile_name=testbed + "-Automation-Radius-Profile-" + mode)
|
||||||
try:
|
try:
|
||||||
instantiate_profile.create_radius_profile(radius_info=radius_info)
|
instantiate_profile.create_radius_profile(radius_info=radius_info)
|
||||||
@@ -568,14 +568,33 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
|
|||||||
allure.attach(body=str("VIF Config: " + str(vif_config) + "\n" + "VIF State: " + str(vif_state)),
|
allure.attach(body=str("VIF Config: " + str(vif_config) + "\n" + "VIF State: " + str(vif_state)),
|
||||||
name="SSID Profiles in VIF Config and VIF State: ")
|
name="SSID Profiles in VIF Config and VIF State: ")
|
||||||
|
|
||||||
|
ap_logs = ap_ssh.logread()
|
||||||
|
allure.attach(body=ap_logs, name="AP LOgs: ")
|
||||||
ssid_info = ap_ssh.get_ssid_info()
|
ssid_info = ap_ssh.get_ssid_info()
|
||||||
ssid_data = []
|
ssid_data = []
|
||||||
print(ssid_info)
|
print(ssid_info)
|
||||||
for i in range(0, len(ssid_info)):
|
for i in range(0, len(ssid_info)):
|
||||||
if ssid_info[i][1] == "OPEN":
|
if ssid_info[i][1] == "OPEN":
|
||||||
ssid_info[i].append("")
|
ssid_info[i].append("")
|
||||||
ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] +
|
if ssid_info[i][1] == "OPEN":
|
||||||
|
ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=OPEN" +
|
||||||
" password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
|
" password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
|
||||||
|
if ssid_info[i][1] == "WPA":
|
||||||
|
ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=WPA" +
|
||||||
|
" password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
|
||||||
|
if ssid_info[i][1] == "WPA2":
|
||||||
|
ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=WPA2" +
|
||||||
|
" password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
|
||||||
|
if ssid_info[i][1] == "WPA3_PERSONAL":
|
||||||
|
ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=WPA3" +
|
||||||
|
" password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
|
||||||
|
if ssid_info[i][1] == "WPA | WPA2":
|
||||||
|
ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=WPA|WPA2" +
|
||||||
|
" password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
|
||||||
|
if ssid_info[i][1] == "EAP-TTLS":
|
||||||
|
ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=EAP-TTLS" +
|
||||||
|
" password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
|
||||||
|
|
||||||
ssid_data.append(ssid)
|
ssid_data.append(ssid)
|
||||||
|
|
||||||
# Add bssid password and security from iwinfo data
|
# Add bssid password and security from iwinfo data
|
||||||
|
|||||||
@@ -33,6 +33,7 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
|
|||||||
|
|
||||||
@pytest.mark.wpa_enterprise
|
@pytest.mark.wpa_enterprise
|
||||||
@pytest.mark.twog
|
@pytest.mark.twog
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa_enterprise_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
def test_wpa_enterprise_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||||
test_cases, radius_info, exit_on_fail):
|
test_cases, radius_info, exit_on_fail):
|
||||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
|
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
|
||||||
@@ -44,12 +45,15 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
|
|||||||
vlan = 1
|
vlan = 1
|
||||||
ttls_passwd = radius_info["password"]
|
ttls_passwd = radius_info["password"]
|
||||||
eap = "TTLS"
|
eap = "TTLS"
|
||||||
|
pairwise = "CCMP"
|
||||||
|
group = "CCMP"
|
||||||
identity = radius_info['user']
|
identity = radius_info['user']
|
||||||
|
ieee80211w = 1
|
||||||
if ssid_name not in get_vif_state:
|
if ssid_name not in get_vif_state:
|
||||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||||
mode=mode, band=band,
|
mode=mode, band=band, group=group, pairwise=pairwise, ieee80211w=ieee80211w,
|
||||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||||
station_name=station_names_twog, vlan_id=vlan)
|
station_name=station_names_twog, vlan_id=vlan)
|
||||||
|
|
||||||
@@ -69,6 +73,7 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
|
|||||||
|
|
||||||
@pytest.mark.wpa_enterprise
|
@pytest.mark.wpa_enterprise
|
||||||
@pytest.mark.fiveg
|
@pytest.mark.fiveg
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa_enterprise_5g(self, get_vif_state,station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
def test_wpa_enterprise_5g(self, get_vif_state,station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||||
test_cases, radius_info, exit_on_fail):
|
test_cases, radius_info, exit_on_fail):
|
||||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
|
||||||
@@ -76,16 +81,19 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
|
|||||||
security = "wpa"
|
security = "wpa"
|
||||||
extra_secu = ["wpa2"]
|
extra_secu = ["wpa2"]
|
||||||
mode = "NAT"
|
mode = "NAT"
|
||||||
band = "twog"
|
band = "fiveg"
|
||||||
vlan = 1
|
vlan = 1
|
||||||
ttls_passwd = radius_info["password"]
|
ttls_passwd = radius_info["password"]
|
||||||
eap = "TTLS"
|
eap = "TTLS"
|
||||||
|
pairwise = "CCMP"
|
||||||
|
group = "CCMP"
|
||||||
|
ieee80211w =1
|
||||||
identity = radius_info['user']
|
identity = radius_info['user']
|
||||||
if ssid_name not in get_vif_state:
|
if ssid_name not in get_vif_state:
|
||||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
|
||||||
mode=mode, band=band,
|
mode=mode, band=band, group=group, pairwise=pairwise, ieee80211w=ieee80211w,
|
||||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||||
station_name=station_names_fiveg, vlan_id=vlan)
|
station_name=station_names_fiveg, vlan_id=vlan)
|
||||||
|
|
||||||
@@ -106,6 +114,7 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
|
|||||||
@pytest.mark.sanity_light
|
@pytest.mark.sanity_light
|
||||||
@pytest.mark.wpa2_enterprise
|
@pytest.mark.wpa2_enterprise
|
||||||
@pytest.mark.twog
|
@pytest.mark.twog
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa2_enterprise_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
def test_wpa2_enterprise_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||||
test_cases, radius_info, exit_on_fail):
|
test_cases, radius_info, exit_on_fail):
|
||||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
|
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
|
||||||
@@ -142,6 +151,7 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
|
|||||||
@pytest.mark.sanity_light
|
@pytest.mark.sanity_light
|
||||||
@pytest.mark.wpa2_enterprise
|
@pytest.mark.wpa2_enterprise
|
||||||
@pytest.mark.fiveg
|
@pytest.mark.fiveg
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa2_enterprise_5g(self, get_vif_state, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
def test_wpa2_enterprise_5g(self, get_vif_state, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||||
test_cases, radius_info, exit_on_fail):
|
test_cases, radius_info, exit_on_fail):
|
||||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
|
profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
|
||||||
@@ -177,6 +187,7 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
|
|||||||
|
|
||||||
@pytest.mark.wpa3_enterprise
|
@pytest.mark.wpa3_enterprise
|
||||||
@pytest.mark.twog
|
@pytest.mark.twog
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa3_enterprise_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
def test_wpa3_enterprise_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||||
test_cases, radius_info, exit_on_fail):
|
test_cases, radius_info, exit_on_fail):
|
||||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
|
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
|
||||||
@@ -187,12 +198,13 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
|
|||||||
vlan = 1
|
vlan = 1
|
||||||
ttls_passwd = radius_info["password"]
|
ttls_passwd = radius_info["password"]
|
||||||
eap = "TTLS"
|
eap = "TTLS"
|
||||||
|
key_mgmt = "WPA-EAP-SHA256"
|
||||||
identity = radius_info['user']
|
identity = radius_info['user']
|
||||||
if ssid_name not in get_vif_state:
|
if ssid_name not in get_vif_state:
|
||||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||||
mode=mode, band=band,
|
mode=mode, band=band, key_mgmt=key_mgmt,
|
||||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||||
station_name=station_names_twog, vlan_id=vlan)
|
station_name=station_names_twog, vlan_id=vlan)
|
||||||
|
|
||||||
@@ -212,6 +224,7 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
|
|||||||
|
|
||||||
@pytest.mark.wpa3_enterprise
|
@pytest.mark.wpa3_enterprise
|
||||||
@pytest.mark.fiveg
|
@pytest.mark.fiveg
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa3_enterprise_5g(self, get_vif_state,station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
def test_wpa3_enterprise_5g(self, get_vif_state,station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||||
test_cases, radius_info, exit_on_fail):
|
test_cases, radius_info, exit_on_fail):
|
||||||
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
|
profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
|
||||||
@@ -222,12 +235,13 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
|
|||||||
vlan = 1
|
vlan = 1
|
||||||
ttls_passwd = radius_info["password"]
|
ttls_passwd = radius_info["password"]
|
||||||
eap = "TTLS"
|
eap = "TTLS"
|
||||||
|
key_mgmt = "WPA-EAP-SHA256"
|
||||||
identity = radius_info['user']
|
identity = radius_info['user']
|
||||||
if ssid_name not in get_vif_state:
|
if ssid_name not in get_vif_state:
|
||||||
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
|
||||||
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
|
||||||
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
|
||||||
mode=mode, band=band,
|
mode=mode, band=band, key_mgmt = "WPA-EAP-SHA256",
|
||||||
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
eap=eap, ttls_passwd=ttls_passwd, identity=identity,
|
||||||
station_name=station_names_fiveg, vlan_id=vlan)
|
station_name=station_names_fiveg, vlan_id=vlan)
|
||||||
|
|
||||||
@@ -273,6 +287,7 @@ class TestNATModeEnterpriseTTLSSuiteTwo(object):
|
|||||||
|
|
||||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||||
@pytest.mark.twog
|
@pytest.mark.twog
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa_wpa2_enterprise_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
def test_wpa_wpa2_enterprise_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||||
test_cases, radius_info, exit_on_fail):
|
test_cases, radius_info, exit_on_fail):
|
||||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][0]
|
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][0]
|
||||||
@@ -309,6 +324,7 @@ class TestNATModeEnterpriseTTLSSuiteTwo(object):
|
|||||||
|
|
||||||
@pytest.mark.wpa_wpa2_enterprise_mixed
|
@pytest.mark.wpa_wpa2_enterprise_mixed
|
||||||
@pytest.mark.fiveg
|
@pytest.mark.fiveg
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa_wpa2_enterprise_5g(self, get_vif_state,station_names_fiveg, setup_profiles, get_lanforge_data, lf_test,
|
def test_wpa_wpa2_enterprise_5g(self, get_vif_state,station_names_fiveg, setup_profiles, get_lanforge_data, lf_test,
|
||||||
update_report, test_cases, radius_info, exit_on_fail):
|
update_report, test_cases, radius_info, exit_on_fail):
|
||||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][1]
|
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][1]
|
||||||
@@ -345,6 +361,7 @@ class TestNATModeEnterpriseTTLSSuiteTwo(object):
|
|||||||
|
|
||||||
@pytest.mark.wpa3_enterprise_mixed
|
@pytest.mark.wpa3_enterprise_mixed
|
||||||
@pytest.mark.twog
|
@pytest.mark.twog
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa3_enterprise_mixed_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test,
|
def test_wpa3_enterprise_mixed_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test,
|
||||||
update_report, test_cases, radius_info, exit_on_fail):
|
update_report, test_cases, radius_info, exit_on_fail):
|
||||||
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][0]
|
profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][0]
|
||||||
|
|||||||
@@ -45,6 +45,7 @@ class TestNATModeConnectivitySuiteA(object):
|
|||||||
@pytest.mark.open
|
@pytest.mark.open
|
||||||
@pytest.mark.twog
|
@pytest.mark.twog
|
||||||
@allure.story('open 2.4 GHZ Band')
|
@allure.story('open 2.4 GHZ Band')
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_open_ssid_2g(self, get_vif_state, setup_profiles, get_lanforge_data, lf_test, update_report, station_names_twog,
|
def test_open_ssid_2g(self, get_vif_state, setup_profiles, get_lanforge_data, lf_test, update_report, station_names_twog,
|
||||||
test_cases):
|
test_cases):
|
||||||
"""Client Connectivity open ssid 2.4G
|
"""Client Connectivity open ssid 2.4G
|
||||||
@@ -79,6 +80,7 @@ class TestNATModeConnectivitySuiteA(object):
|
|||||||
@pytest.mark.open
|
@pytest.mark.open
|
||||||
@pytest.mark.fiveg
|
@pytest.mark.fiveg
|
||||||
@allure.story('open 5 GHZ Band')
|
@allure.story('open 5 GHZ Band')
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_open_ssid_5g(self, get_vif_state,get_lanforge_data, lf_test, test_cases, station_names_fiveg, update_report):
|
def test_open_ssid_5g(self, get_vif_state,get_lanforge_data, lf_test, test_cases, station_names_fiveg, update_report):
|
||||||
"""Client Connectivity open ssid 5G
|
"""Client Connectivity open ssid 5G
|
||||||
pytest -m "client_connectivity and bridge and general and open and fiveg"
|
pytest -m "client_connectivity and bridge and general and open and fiveg"
|
||||||
@@ -113,6 +115,7 @@ class TestNATModeConnectivitySuiteA(object):
|
|||||||
@pytest.mark.wpa
|
@pytest.mark.wpa
|
||||||
@pytest.mark.twog
|
@pytest.mark.twog
|
||||||
@allure.story('wpa 2.4 GHZ Band')
|
@allure.story('wpa 2.4 GHZ Band')
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa_ssid_2g(self, get_vif_state,get_lanforge_data, update_report,
|
def test_wpa_ssid_2g(self, get_vif_state,get_lanforge_data, update_report,
|
||||||
lf_test, test_cases, station_names_twog):
|
lf_test, test_cases, station_names_twog):
|
||||||
"""Client Connectivity wpa ssid 2.4G
|
"""Client Connectivity wpa ssid 2.4G
|
||||||
@@ -148,6 +151,7 @@ class TestNATModeConnectivitySuiteA(object):
|
|||||||
@pytest.mark.wpa
|
@pytest.mark.wpa
|
||||||
@pytest.mark.fiveg
|
@pytest.mark.fiveg
|
||||||
@allure.story('wpa 5 GHZ Band')
|
@allure.story('wpa 5 GHZ Band')
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa_ssid_5g(self, get_vif_state,lf_test, update_report, test_cases, station_names_fiveg, get_lanforge_data):
|
def test_wpa_ssid_5g(self, get_vif_state,lf_test, update_report, test_cases, station_names_fiveg, get_lanforge_data):
|
||||||
"""Client Connectivity wpa ssid 5G
|
"""Client Connectivity wpa ssid 5G
|
||||||
pytest -m "client_connectivity and bridge and general and wpa and fiveg"
|
pytest -m "client_connectivity and bridge and general and wpa and fiveg"
|
||||||
@@ -182,6 +186,7 @@ class TestNATModeConnectivitySuiteA(object):
|
|||||||
@pytest.mark.wpa2_personal
|
@pytest.mark.wpa2_personal
|
||||||
@pytest.mark.twog
|
@pytest.mark.twog
|
||||||
@allure.story('wpa2_personal 2.4 GHZ Band')
|
@allure.story('wpa2_personal 2.4 GHZ Band')
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa2_personal_ssid_2g(self, get_vif_state,get_lanforge_data, lf_test, update_report, test_cases,
|
def test_wpa2_personal_ssid_2g(self, get_vif_state,get_lanforge_data, lf_test, update_report, test_cases,
|
||||||
station_names_twog):
|
station_names_twog):
|
||||||
"""Client Connectivity wpa2_personal ssid 2.4G
|
"""Client Connectivity wpa2_personal ssid 2.4G
|
||||||
@@ -217,6 +222,7 @@ class TestNATModeConnectivitySuiteA(object):
|
|||||||
@pytest.mark.wpa2_personal
|
@pytest.mark.wpa2_personal
|
||||||
@pytest.mark.fiveg
|
@pytest.mark.fiveg
|
||||||
@allure.story('wpa2_personal 5 GHZ Band')
|
@allure.story('wpa2_personal 5 GHZ Band')
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa2_personal_ssid_5g(self, get_vif_state,get_lanforge_data, update_report, test_cases, station_names_fiveg,
|
def test_wpa2_personal_ssid_5g(self, get_vif_state,get_lanforge_data, update_report, test_cases, station_names_fiveg,
|
||||||
lf_test):
|
lf_test):
|
||||||
"""Client Connectivity wpa2_personal ssid 5G
|
"""Client Connectivity wpa2_personal ssid 5G
|
||||||
@@ -250,7 +256,7 @@ class TestNATModeConnectivitySuiteA(object):
|
|||||||
|
|
||||||
|
|
||||||
setup_params_general_two = {
|
setup_params_general_two = {
|
||||||
"mode": "BRIDGE",
|
"mode": "NAT",
|
||||||
"ssid_modes": {
|
"ssid_modes": {
|
||||||
"wpa3_personal": [
|
"wpa3_personal": [
|
||||||
{"ssid_name": "ssid_wpa3_p_2g", "appliedRadios": ["is2dot4GHz"], "security_key": "something"},
|
{"ssid_name": "ssid_wpa3_p_2g", "appliedRadios": ["is2dot4GHz"], "security_key": "something"},
|
||||||
@@ -287,6 +293,7 @@ class TestBridgeModeConnectivitySuiteB(object):
|
|||||||
@pytest.mark.wpa3_personal
|
@pytest.mark.wpa3_personal
|
||||||
@pytest.mark.twog
|
@pytest.mark.twog
|
||||||
@allure.story('open 2.4 GHZ Band')
|
@allure.story('open 2.4 GHZ Band')
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa3_personal_ssid_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
def test_wpa3_personal_ssid_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
|
||||||
test_cases):
|
test_cases):
|
||||||
"""Client Connectivity open ssid 2.4G
|
"""Client Connectivity open ssid 2.4G
|
||||||
@@ -321,6 +328,7 @@ class TestBridgeModeConnectivitySuiteB(object):
|
|||||||
@pytest.mark.wpa3_personal
|
@pytest.mark.wpa3_personal
|
||||||
@pytest.mark.fiveg
|
@pytest.mark.fiveg
|
||||||
@allure.story('open 5 GHZ Band')
|
@allure.story('open 5 GHZ Band')
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa3_personal_ssid_5g(self, get_vif_state,station_names_fiveg, get_lanforge_data, lf_test, test_cases, update_report):
|
def test_wpa3_personal_ssid_5g(self, get_vif_state,station_names_fiveg, get_lanforge_data, lf_test, test_cases, update_report):
|
||||||
"""Client Connectivity open ssid 2.4G
|
"""Client Connectivity open ssid 2.4G
|
||||||
pytest -m "client_connectivity and bridge and general and wpa3_personal and fiveg"
|
pytest -m "client_connectivity and bridge and general and wpa3_personal and fiveg"
|
||||||
@@ -354,6 +362,7 @@ class TestBridgeModeConnectivitySuiteB(object):
|
|||||||
@pytest.mark.wpa3_personal_mixed
|
@pytest.mark.wpa3_personal_mixed
|
||||||
@pytest.mark.twog
|
@pytest.mark.twog
|
||||||
@allure.story('open 2.4 GHZ Band')
|
@allure.story('open 2.4 GHZ Band')
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa3_personal_mixed_ssid_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test,
|
def test_wpa3_personal_mixed_ssid_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test,
|
||||||
update_report,
|
update_report,
|
||||||
test_cases):
|
test_cases):
|
||||||
@@ -389,6 +398,7 @@ class TestBridgeModeConnectivitySuiteB(object):
|
|||||||
@pytest.mark.wpa3_personal_mixed
|
@pytest.mark.wpa3_personal_mixed
|
||||||
@pytest.mark.fiveg
|
@pytest.mark.fiveg
|
||||||
@allure.story('open 5 GHZ Band')
|
@allure.story('open 5 GHZ Band')
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa3_personal_mixed_ssid_5g(self, get_vif_state,station_names_fiveg, get_lanforge_data, lf_test, test_cases,
|
def test_wpa3_personal_mixed_ssid_5g(self, get_vif_state,station_names_fiveg, get_lanforge_data, lf_test, test_cases,
|
||||||
update_report):
|
update_report):
|
||||||
"""Client Connectivity open ssid 2.4G
|
"""Client Connectivity open ssid 2.4G
|
||||||
@@ -423,6 +433,7 @@ class TestBridgeModeConnectivitySuiteB(object):
|
|||||||
@pytest.mark.wpa_wpa2_personal_mixed
|
@pytest.mark.wpa_wpa2_personal_mixed
|
||||||
@pytest.mark.twog
|
@pytest.mark.twog
|
||||||
@allure.story('wpa wpa2 personal mixed 2.4 GHZ Band')
|
@allure.story('wpa wpa2 personal mixed 2.4 GHZ Band')
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa_wpa2_personal_ssid_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test,
|
def test_wpa_wpa2_personal_ssid_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test,
|
||||||
update_report,
|
update_report,
|
||||||
test_cases):
|
test_cases):
|
||||||
@@ -459,6 +470,7 @@ class TestBridgeModeConnectivitySuiteB(object):
|
|||||||
@pytest.mark.wpa_wpa2_personal_mixed
|
@pytest.mark.wpa_wpa2_personal_mixed
|
||||||
@pytest.mark.fiveg
|
@pytest.mark.fiveg
|
||||||
@allure.story('wpa wpa2 personal mixed 5 GHZ Band')
|
@allure.story('wpa wpa2 personal mixed 5 GHZ Band')
|
||||||
|
@allure.severity(allure.severity_level.CRITICAL)
|
||||||
def test_wpa_wpa2_personal_ssid_5g(self, get_vif_state,station_names_fiveg, get_lanforge_data, lf_test, test_cases,
|
def test_wpa_wpa2_personal_ssid_5g(self, get_vif_state,station_names_fiveg, get_lanforge_data, lf_test, test_cases,
|
||||||
update_report):
|
update_report):
|
||||||
"""Client Connectivity open ssid 2.4G
|
"""Client Connectivity open ssid 2.4G
|
||||||
|
|||||||
Reference in New Issue
Block a user