mirror of
				https://github.com/Telecominfraproject/wlan-testing.git
				synced 2025-11-03 20:38:05 +00:00 
			
		
		
		
	wpa3 eap nat mode fixes
Signed-off-by: shivamcandela <shivam.thakur@candelatech.com>
This commit is contained in:
		@@ -148,10 +148,36 @@ class APNOS:
 | 
			
		||||
                info.append(":".join(mac_info_list).replace("'", ""))
 | 
			
		||||
            if ssid[0].split(":")[0] == "b'security":
 | 
			
		||||
                security = ssid[0].split(":")[1].split(",")[2].replace("]", "").replace('"', "").replace("'", "")
 | 
			
		||||
                info.append(security)
 | 
			
		||||
                print(ssid[0].split(":")[1])
 | 
			
		||||
                if security != "OPEN":
 | 
			
		||||
                    security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
 | 
			
		||||
                    if security == "WPA-PSK":
 | 
			
		||||
                        if ssid[0].split(":")[1].split(",")[6].__contains__("1"):
 | 
			
		||||
                            info.append("WPA")
 | 
			
		||||
                            security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
 | 
			
		||||
                        if ssid[0].split(":")[1].split(",")[6].__contains__("2"):
 | 
			
		||||
                            info.append("WPA2")
 | 
			
		||||
                            security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
 | 
			
		||||
                        if ssid[0].split(":")[1].split(",")[6].__contains__("mixed"):
 | 
			
		||||
                            info.append("WPA | WPA2")
 | 
			
		||||
                            security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
 | 
			
		||||
                    if security == "WPA-SAE":
 | 
			
		||||
                        if ssid[0].split(":")[1].split(",")[6].__contains__("3"):
 | 
			
		||||
                            info.append("WPA3_PERSONAL")
 | 
			
		||||
                            security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
 | 
			
		||||
                        if ssid[0].split(":")[1].split(",")[6].__contains__("mixed"):
 | 
			
		||||
                            info.append("WPA3_PERSONAL")
 | 
			
		||||
                            security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
 | 
			
		||||
                    if security == "WPA-EAP":
 | 
			
		||||
                        info.append("EAP-TTLS")
 | 
			
		||||
                        security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
 | 
			
		||||
                    if security == "WPA3-EAP":
 | 
			
		||||
                        info.append("EAP-TTLS")
 | 
			
		||||
                        security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
 | 
			
		||||
                    else:
 | 
			
		||||
                        security_key = ssid[0].split(":")[1].split(",")[4].replace('"', "").replace("]", "")
 | 
			
		||||
                    info.append(security_key)
 | 
			
		||||
                else:
 | 
			
		||||
                    info.append("OPEN")
 | 
			
		||||
            if ssid[0].split(":")[0] == "b'ssid":
 | 
			
		||||
                info.append(ssid[0].split(":")[1].replace("'", ""))
 | 
			
		||||
                ssid_info_list.append(info)
 | 
			
		||||
@@ -255,7 +281,6 @@ class APNOS:
 | 
			
		||||
        return redirector
 | 
			
		||||
 | 
			
		||||
    def run_generic_command(self, cmd=""):
 | 
			
		||||
        allure.attach(name="run_generic_command ", body=cmd)
 | 
			
		||||
        try:
 | 
			
		||||
            client = self.ssh_cli_connect()
 | 
			
		||||
            cmd = cmd
 | 
			
		||||
@@ -263,20 +288,38 @@ class APNOS:
 | 
			
		||||
                cmd = f"cd ~/cicd-git/ && ./openwrt_ctl.py {self.owrt_args} -t {self.tty} --action " \
 | 
			
		||||
                      f"cmd --value \"{cmd}\" "
 | 
			
		||||
            stdin, stdout, stderr = client.exec_command(cmd)
 | 
			
		||||
            input = stdin.read().decode('utf-8').splitlines()
 | 
			
		||||
            output = stdout.read().decode('utf-8').splitlines()
 | 
			
		||||
            error = stderr.read().decode('utf-8').splitlines()
 | 
			
		||||
            output = stdout.read()
 | 
			
		||||
            print(output, stderr.read())
 | 
			
		||||
            status = output.decode('utf-8').splitlines()
 | 
			
		||||
            allure.attach(name="get_redirector output ", body=str(stderr))
 | 
			
		||||
            redirector = status[1].replace(" ", "").split("|")[1]
 | 
			
		||||
            client.close()
 | 
			
		||||
        except Exception as e:
 | 
			
		||||
            print(e)
 | 
			
		||||
            allure.attach(name="run_generic_command - Exception ", body=str(e))
 | 
			
		||||
            input = "Error"
 | 
			
		||||
            output = "Error"
 | 
			
		||||
            error = "Error"
 | 
			
		||||
        allure.attach(name="run_generic_command ", body=input)
 | 
			
		||||
        allure.attach(name="run_generic_command ", body=str(output))
 | 
			
		||||
        allure.attach(name="run_generic_command ", body=error)
 | 
			
		||||
        return [input, output, error]
 | 
			
		||||
            allure.attach(name="get_redirector - Exception ", body=str(e))
 | 
			
		||||
            redirector = "Error"
 | 
			
		||||
        allure.attach(name="get_redirector ", body=redirector)
 | 
			
		||||
        return redirector
 | 
			
		||||
 | 
			
		||||
    def logread(self):
 | 
			
		||||
        try:
 | 
			
		||||
            client = self.ssh_cli_connect()
 | 
			
		||||
            cmd = "logread"
 | 
			
		||||
            if self.mode:
 | 
			
		||||
                cmd = f"cd ~/cicd-git/ && ./openwrt_ctl.py {self.owrt_args} -t {self.tty} --action " \
 | 
			
		||||
                      f"cmd --value \"{cmd}\" "
 | 
			
		||||
            stdin, stdout, stderr = client.exec_command(cmd)
 | 
			
		||||
            output = stdout.read()
 | 
			
		||||
            status = output.decode('utf-8').splitlines()
 | 
			
		||||
            logread = status
 | 
			
		||||
            logs = ""
 | 
			
		||||
            for i in logread:
 | 
			
		||||
                logs = logs + i + "\n"
 | 
			
		||||
            client.close()
 | 
			
		||||
        except Exception as e:
 | 
			
		||||
            print(e)
 | 
			
		||||
            logs = ""
 | 
			
		||||
        return logs
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
if __name__ == '__main__':
 | 
			
		||||
@@ -286,7 +329,7 @@ if __name__ == '__main__':
 | 
			
		||||
        'username': "lanforge",
 | 
			
		||||
        'password': "pumpkin77",
 | 
			
		||||
        'port': 8803,
 | 
			
		||||
        'jumphost_tty': '/dev/ttyAP1',
 | 
			
		||||
        'jumphost_tty': '/dev/ttyAP2',
 | 
			
		||||
 | 
			
		||||
    }
 | 
			
		||||
    var = APNOS(credentials=obj)
 | 
			
		||||
 
 | 
			
		||||
@@ -84,7 +84,7 @@ class RunTest:
 | 
			
		||||
        self.staConnect.dut_security = security
 | 
			
		||||
        self.staConnect.station_names = station_name
 | 
			
		||||
        self.staConnect.runtime_secs = 40
 | 
			
		||||
        self.staConnect.bringup_time_sec = 60
 | 
			
		||||
        self.staConnect.bringup_time_sec = 80
 | 
			
		||||
        self.staConnect.cleanup_on_exit = True
 | 
			
		||||
        # self.staConnect.cleanup()
 | 
			
		||||
        self.staConnect.setup(extra_securities=extra_securities)
 | 
			
		||||
@@ -110,7 +110,7 @@ class RunTest:
 | 
			
		||||
                    mode="BRIDGE", band="twog", vlan_id=100,
 | 
			
		||||
                    station_name=[], key_mgmt="WPA-EAP",
 | 
			
		||||
                    pairwise="NA", group="NA", wpa_psk="DEFAULT",
 | 
			
		||||
                    ttls_passwd="nolastart",
 | 
			
		||||
                    ttls_passwd="nolastart", ieee80211w=1,
 | 
			
		||||
                    wep_key="NA", ca_cert="NA", eap="TTLS", identity="nolaradius"):
 | 
			
		||||
        self.eap_connect = TTLSTest(host=self.lanforge_ip, port=self.lanforge_port,
 | 
			
		||||
                                    sta_list=station_name, vap=False, _debug_on=self.debug)
 | 
			
		||||
@@ -134,10 +134,13 @@ class RunTest:
 | 
			
		||||
            # self.eap_connect.sta_prefix = self.fiveg_prefix
 | 
			
		||||
        # self.eap_connect.resource = 1
 | 
			
		||||
        if eap == "TTLS":
 | 
			
		||||
            self.eap_connect.ieee80211w = 0
 | 
			
		||||
            self.eap_connect.ieee80211w = ieee80211w
 | 
			
		||||
            self.eap_connect.key_mgmt = key_mgmt
 | 
			
		||||
            self.eap_connect.station_profile.set_command_flag("add_sta", "80211u_enable", 0)
 | 
			
		||||
            self.eap_connect.identity = identity
 | 
			
		||||
            self.eap_connect.ttls_passwd = ttls_passwd
 | 
			
		||||
            self.eap_connect.pairwise = pairwise
 | 
			
		||||
            self.eap_connect.group = group
 | 
			
		||||
        if eap == "TLS":
 | 
			
		||||
            self.eap_connect.key_mgmt = "WPA-EAP-SUITE-B"
 | 
			
		||||
            self.eap_connect.station_profile.set_command_flag("add_sta", "80211u_enable", 0)
 | 
			
		||||
 
 | 
			
		||||
@@ -39,6 +39,46 @@ CONFIGURATION = {
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    },
 | 
			
		||||
    "basic-02": {
 | 
			
		||||
        "controller": {
 | 
			
		||||
            'url': "https://wlan-portal-svc-nola-ext-04.cicd.lab.wlan.tip.build",  # API base url for the controller
 | 
			
		||||
            'username': 'support@example.com',
 | 
			
		||||
            'password': 'support',
 | 
			
		||||
            'version': "1.1.0-SNAPSHOT",
 | 
			
		||||
            'commit_date': "2021-06-01"
 | 
			
		||||
        },
 | 
			
		||||
        'access_point': [
 | 
			
		||||
            {
 | 
			
		||||
                'model': 'eap101',
 | 
			
		||||
                'mode': 'wifi6',
 | 
			
		||||
                'serial': '34efb6af48db',
 | 
			
		||||
                'jumphost': True,
 | 
			
		||||
                'ip': "localhost",
 | 
			
		||||
                'username': "lanforge",
 | 
			
		||||
                'password': "pumpkin77",
 | 
			
		||||
                'port': 8803,
 | 
			
		||||
                'jumphost_tty': '/dev/ttyAP2',
 | 
			
		||||
                'version': "https://tip.jfrog.io/artifactory/tip-wlan-ap-firmware/eap101/dev/eap101-2021-06-15-pending-39bd8f3.tar.gz"
 | 
			
		||||
            }
 | 
			
		||||
        ],
 | 
			
		||||
        "traffic_generator": {
 | 
			
		||||
            "name": "lanforge",
 | 
			
		||||
            "details": {
 | 
			
		||||
                "ip": "localhost",
 | 
			
		||||
                "port": 8801,
 | 
			
		||||
                "ssh_port": 8802,
 | 
			
		||||
                "2.4G-Radio": ["wiphy4"],
 | 
			
		||||
                "5G-Radio": ["wiphy5"],
 | 
			
		||||
                "AX-Radio": ["wiphy0", "wiphy1", "wiphy2", "wiphy3"],
 | 
			
		||||
                "upstream": "1.1.eth2",
 | 
			
		||||
                "upstream_subnet": "10.28.2.1/24",
 | 
			
		||||
                "uplink": "1.1.eth3",
 | 
			
		||||
                "2.4G-Station-Name": "sta0",
 | 
			
		||||
                "5G-Station-Name": "sta1",
 | 
			
		||||
                "AX-Station-Name": "ax"
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    },  # checked
 | 
			
		||||
    # This is sample Config of a Testbed
 | 
			
		||||
    "basic-ext-01": {
 | 
			
		||||
        "controller": {
 | 
			
		||||
 
 | 
			
		||||
@@ -122,7 +122,7 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
 | 
			
		||||
    # Radius Profile Creation
 | 
			
		||||
    if parameter["radius"]:
 | 
			
		||||
        radius_info = radius_info
 | 
			
		||||
        radius_info["name"] = testbed + "-Automation-Radius-Profile-" + testbed
 | 
			
		||||
        radius_info["name"] = testbed + "-Automation-Radius-Profile-" + mode
 | 
			
		||||
        instantiate_profile.delete_profile_by_name(profile_name=testbed + "-Automation-Radius-Profile-" + mode)
 | 
			
		||||
        try:
 | 
			
		||||
            instantiate_profile.create_radius_profile(radius_info=radius_info)
 | 
			
		||||
@@ -568,14 +568,33 @@ def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment
 | 
			
		||||
    allure.attach(body=str("VIF Config: " + str(vif_config) + "\n" + "VIF State: " + str(vif_state)),
 | 
			
		||||
                  name="SSID Profiles in VIF Config and VIF State: ")
 | 
			
		||||
 | 
			
		||||
    ap_logs = ap_ssh.logread()
 | 
			
		||||
    allure.attach(body=ap_logs, name="AP LOgs: ")
 | 
			
		||||
    ssid_info = ap_ssh.get_ssid_info()
 | 
			
		||||
    ssid_data = []
 | 
			
		||||
    print(ssid_info)
 | 
			
		||||
    for i in range(0, len(ssid_info)):
 | 
			
		||||
        if ssid_info[i][1] == "OPEN":
 | 
			
		||||
            ssid_info[i].append("")
 | 
			
		||||
        ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] +
 | 
			
		||||
                " password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
 | 
			
		||||
        if ssid_info[i][1] == "OPEN":
 | 
			
		||||
            ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=OPEN" +
 | 
			
		||||
                    " password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
 | 
			
		||||
        if ssid_info[i][1] == "WPA":
 | 
			
		||||
            ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=WPA" +
 | 
			
		||||
                    " password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
 | 
			
		||||
        if ssid_info[i][1] == "WPA2":
 | 
			
		||||
            ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=WPA2" +
 | 
			
		||||
                    " password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
 | 
			
		||||
        if ssid_info[i][1] == "WPA3_PERSONAL":
 | 
			
		||||
            ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=WPA3" +
 | 
			
		||||
                    " password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
 | 
			
		||||
        if ssid_info[i][1] == "WPA | WPA2":
 | 
			
		||||
            ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=WPA|WPA2" +
 | 
			
		||||
                    " password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
 | 
			
		||||
        if ssid_info[i][1] == "EAP-TTLS":
 | 
			
		||||
            ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=EAP-TTLS" +
 | 
			
		||||
                    " password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
 | 
			
		||||
 | 
			
		||||
        ssid_data.append(ssid)
 | 
			
		||||
 | 
			
		||||
    # Add bssid password and security from iwinfo data
 | 
			
		||||
 
 | 
			
		||||
@@ -33,6 +33,7 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
 | 
			
		||||
 | 
			
		||||
    @pytest.mark.wpa_enterprise
 | 
			
		||||
    @pytest.mark.twog
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa_enterprise_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
 | 
			
		||||
                               test_cases, radius_info, exit_on_fail):
 | 
			
		||||
        profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][0]
 | 
			
		||||
@@ -44,12 +45,15 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
 | 
			
		||||
        vlan = 1
 | 
			
		||||
        ttls_passwd = radius_info["password"]
 | 
			
		||||
        eap = "TTLS"
 | 
			
		||||
        pairwise = "CCMP"
 | 
			
		||||
        group = "CCMP"
 | 
			
		||||
        identity = radius_info['user']
 | 
			
		||||
        ieee80211w = 1
 | 
			
		||||
        if ssid_name not in get_vif_state:
 | 
			
		||||
            allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
 | 
			
		||||
            pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
 | 
			
		||||
        passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
 | 
			
		||||
                                     mode=mode, band=band,
 | 
			
		||||
                                     mode=mode, band=band, group=group, pairwise=pairwise, ieee80211w=ieee80211w,
 | 
			
		||||
                                     eap=eap, ttls_passwd=ttls_passwd, identity=identity,
 | 
			
		||||
                                     station_name=station_names_twog, vlan_id=vlan)
 | 
			
		||||
 | 
			
		||||
@@ -69,6 +73,7 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
 | 
			
		||||
 | 
			
		||||
    @pytest.mark.wpa_enterprise
 | 
			
		||||
    @pytest.mark.fiveg
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa_enterprise_5g(self, get_vif_state,station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
 | 
			
		||||
                               test_cases, radius_info, exit_on_fail):
 | 
			
		||||
        profile_data = setup_params_enterprise["ssid_modes"]["wpa_enterprise"][1]
 | 
			
		||||
@@ -76,16 +81,19 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
 | 
			
		||||
        security = "wpa"
 | 
			
		||||
        extra_secu = ["wpa2"]
 | 
			
		||||
        mode = "NAT"
 | 
			
		||||
        band = "twog"
 | 
			
		||||
        band = "fiveg"
 | 
			
		||||
        vlan = 1
 | 
			
		||||
        ttls_passwd = radius_info["password"]
 | 
			
		||||
        eap = "TTLS"
 | 
			
		||||
        pairwise = "CCMP"
 | 
			
		||||
        group = "CCMP"
 | 
			
		||||
        ieee80211w =1
 | 
			
		||||
        identity = radius_info['user']
 | 
			
		||||
        if ssid_name not in get_vif_state:
 | 
			
		||||
            allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
 | 
			
		||||
            pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
 | 
			
		||||
        passes = lf_test.EAP_Connect(ssid=ssid_name, security=security, extra_securities=extra_secu,
 | 
			
		||||
                                     mode=mode, band=band,
 | 
			
		||||
                                     mode=mode, band=band, group=group, pairwise=pairwise, ieee80211w=ieee80211w,
 | 
			
		||||
                                     eap=eap, ttls_passwd=ttls_passwd, identity=identity,
 | 
			
		||||
                                     station_name=station_names_fiveg, vlan_id=vlan)
 | 
			
		||||
 | 
			
		||||
@@ -106,6 +114,7 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
 | 
			
		||||
    @pytest.mark.sanity_light
 | 
			
		||||
    @pytest.mark.wpa2_enterprise
 | 
			
		||||
    @pytest.mark.twog
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa2_enterprise_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
 | 
			
		||||
                                test_cases, radius_info, exit_on_fail):
 | 
			
		||||
        profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][0]
 | 
			
		||||
@@ -142,6 +151,7 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
 | 
			
		||||
    @pytest.mark.sanity_light
 | 
			
		||||
    @pytest.mark.wpa2_enterprise
 | 
			
		||||
    @pytest.mark.fiveg
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa2_enterprise_5g(self, get_vif_state, station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
 | 
			
		||||
                                test_cases, radius_info, exit_on_fail):
 | 
			
		||||
        profile_data = setup_params_enterprise["ssid_modes"]["wpa2_enterprise"][1]
 | 
			
		||||
@@ -177,6 +187,7 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
 | 
			
		||||
 | 
			
		||||
    @pytest.mark.wpa3_enterprise
 | 
			
		||||
    @pytest.mark.twog
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa3_enterprise_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
 | 
			
		||||
                                test_cases, radius_info, exit_on_fail):
 | 
			
		||||
        profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][0]
 | 
			
		||||
@@ -187,12 +198,13 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
 | 
			
		||||
        vlan = 1
 | 
			
		||||
        ttls_passwd = radius_info["password"]
 | 
			
		||||
        eap = "TTLS"
 | 
			
		||||
        key_mgmt = "WPA-EAP-SHA256"
 | 
			
		||||
        identity = radius_info['user']
 | 
			
		||||
        if ssid_name not in get_vif_state:
 | 
			
		||||
            allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
 | 
			
		||||
            pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
 | 
			
		||||
        passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
 | 
			
		||||
                                     mode=mode, band=band,
 | 
			
		||||
                                     mode=mode, band=band, key_mgmt=key_mgmt,
 | 
			
		||||
                                     eap=eap, ttls_passwd=ttls_passwd, identity=identity,
 | 
			
		||||
                                     station_name=station_names_twog, vlan_id=vlan)
 | 
			
		||||
 | 
			
		||||
@@ -212,6 +224,7 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
 | 
			
		||||
 | 
			
		||||
    @pytest.mark.wpa3_enterprise
 | 
			
		||||
    @pytest.mark.fiveg
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa3_enterprise_5g(self, get_vif_state,station_names_fiveg, setup_profiles, get_lanforge_data, lf_test, update_report,
 | 
			
		||||
                                test_cases, radius_info, exit_on_fail):
 | 
			
		||||
        profile_data = setup_params_enterprise["ssid_modes"]["wpa3_enterprise"][1]
 | 
			
		||||
@@ -222,12 +235,13 @@ class TestNATModeEnterpriseTTLSSuiteOne(object):
 | 
			
		||||
        vlan = 1
 | 
			
		||||
        ttls_passwd = radius_info["password"]
 | 
			
		||||
        eap = "TTLS"
 | 
			
		||||
        key_mgmt = "WPA-EAP-SHA256"
 | 
			
		||||
        identity = radius_info['user']
 | 
			
		||||
        if ssid_name not in get_vif_state:
 | 
			
		||||
            allure.attach(name="retest,vif state ssid not available:", body=str(get_vif_state))
 | 
			
		||||
            pytest.xfail("SSID NOT AVAILABLE IN VIF STATE")
 | 
			
		||||
        passes = lf_test.EAP_Connect(ssid=ssid_name, security=security,
 | 
			
		||||
                                     mode=mode, band=band,
 | 
			
		||||
                                     mode=mode, band=band, key_mgmt = "WPA-EAP-SHA256",
 | 
			
		||||
                                     eap=eap, ttls_passwd=ttls_passwd, identity=identity,
 | 
			
		||||
                                     station_name=station_names_fiveg, vlan_id=vlan)
 | 
			
		||||
 | 
			
		||||
@@ -273,6 +287,7 @@ class TestNATModeEnterpriseTTLSSuiteTwo(object):
 | 
			
		||||
 | 
			
		||||
    @pytest.mark.wpa_wpa2_enterprise_mixed
 | 
			
		||||
    @pytest.mark.twog
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa_wpa2_enterprise_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
 | 
			
		||||
                                    test_cases, radius_info, exit_on_fail):
 | 
			
		||||
        profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][0]
 | 
			
		||||
@@ -309,6 +324,7 @@ class TestNATModeEnterpriseTTLSSuiteTwo(object):
 | 
			
		||||
 | 
			
		||||
    @pytest.mark.wpa_wpa2_enterprise_mixed
 | 
			
		||||
    @pytest.mark.fiveg
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa_wpa2_enterprise_5g(self, get_vif_state,station_names_fiveg, setup_profiles, get_lanforge_data, lf_test,
 | 
			
		||||
                                    update_report, test_cases, radius_info, exit_on_fail):
 | 
			
		||||
        profile_data = setup_params_enterprise_two["ssid_modes"]["wpa_wpa2_enterprise_mixed"][1]
 | 
			
		||||
@@ -345,6 +361,7 @@ class TestNATModeEnterpriseTTLSSuiteTwo(object):
 | 
			
		||||
 | 
			
		||||
    @pytest.mark.wpa3_enterprise_mixed
 | 
			
		||||
    @pytest.mark.twog
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa3_enterprise_mixed_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test,
 | 
			
		||||
                                      update_report, test_cases, radius_info, exit_on_fail):
 | 
			
		||||
        profile_data = setup_params_enterprise_two["ssid_modes"]["wpa3_enterprise_mixed"][0]
 | 
			
		||||
 
 | 
			
		||||
@@ -45,7 +45,8 @@ class TestNATModeConnectivitySuiteA(object):
 | 
			
		||||
    @pytest.mark.open
 | 
			
		||||
    @pytest.mark.twog
 | 
			
		||||
    @allure.story('open 2.4 GHZ Band')
 | 
			
		||||
    def test_open_ssid_2g(self, get_vif_state,setup_profiles, get_lanforge_data, lf_test, update_report, station_names_twog,
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_open_ssid_2g(self, get_vif_state, setup_profiles, get_lanforge_data, lf_test, update_report, station_names_twog,
 | 
			
		||||
                          test_cases):
 | 
			
		||||
        """Client Connectivity open ssid 2.4G
 | 
			
		||||
           pytest -m "client_connectivity and nat and general and open and twog"
 | 
			
		||||
@@ -79,6 +80,7 @@ class TestNATModeConnectivitySuiteA(object):
 | 
			
		||||
    @pytest.mark.open
 | 
			
		||||
    @pytest.mark.fiveg
 | 
			
		||||
    @allure.story('open 5 GHZ Band')
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_open_ssid_5g(self, get_vif_state,get_lanforge_data, lf_test, test_cases, station_names_fiveg, update_report):
 | 
			
		||||
        """Client Connectivity open ssid 5G
 | 
			
		||||
           pytest -m "client_connectivity and bridge and general and open and fiveg"
 | 
			
		||||
@@ -113,6 +115,7 @@ class TestNATModeConnectivitySuiteA(object):
 | 
			
		||||
    @pytest.mark.wpa
 | 
			
		||||
    @pytest.mark.twog
 | 
			
		||||
    @allure.story('wpa 2.4 GHZ Band')
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa_ssid_2g(self, get_vif_state,get_lanforge_data, update_report,
 | 
			
		||||
                         lf_test, test_cases, station_names_twog):
 | 
			
		||||
        """Client Connectivity wpa ssid 2.4G
 | 
			
		||||
@@ -148,6 +151,7 @@ class TestNATModeConnectivitySuiteA(object):
 | 
			
		||||
    @pytest.mark.wpa
 | 
			
		||||
    @pytest.mark.fiveg
 | 
			
		||||
    @allure.story('wpa 5 GHZ Band')
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa_ssid_5g(self, get_vif_state,lf_test, update_report, test_cases, station_names_fiveg, get_lanforge_data):
 | 
			
		||||
        """Client Connectivity wpa ssid 5G
 | 
			
		||||
           pytest -m "client_connectivity and bridge and general and wpa and fiveg"
 | 
			
		||||
@@ -182,6 +186,7 @@ class TestNATModeConnectivitySuiteA(object):
 | 
			
		||||
    @pytest.mark.wpa2_personal
 | 
			
		||||
    @pytest.mark.twog
 | 
			
		||||
    @allure.story('wpa2_personal 2.4 GHZ Band')
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa2_personal_ssid_2g(self, get_vif_state,get_lanforge_data, lf_test, update_report, test_cases,
 | 
			
		||||
                                   station_names_twog):
 | 
			
		||||
        """Client Connectivity wpa2_personal ssid 2.4G
 | 
			
		||||
@@ -217,6 +222,7 @@ class TestNATModeConnectivitySuiteA(object):
 | 
			
		||||
    @pytest.mark.wpa2_personal
 | 
			
		||||
    @pytest.mark.fiveg
 | 
			
		||||
    @allure.story('wpa2_personal 5 GHZ Band')
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa2_personal_ssid_5g(self, get_vif_state,get_lanforge_data, update_report, test_cases, station_names_fiveg,
 | 
			
		||||
                                   lf_test):
 | 
			
		||||
        """Client Connectivity wpa2_personal ssid 5G
 | 
			
		||||
@@ -250,7 +256,7 @@ class TestNATModeConnectivitySuiteA(object):
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
setup_params_general_two = {
 | 
			
		||||
    "mode": "BRIDGE",
 | 
			
		||||
    "mode": "NAT",
 | 
			
		||||
    "ssid_modes": {
 | 
			
		||||
        "wpa3_personal": [
 | 
			
		||||
            {"ssid_name": "ssid_wpa3_p_2g", "appliedRadios": ["is2dot4GHz"], "security_key": "something"},
 | 
			
		||||
@@ -287,6 +293,7 @@ class TestBridgeModeConnectivitySuiteB(object):
 | 
			
		||||
    @pytest.mark.wpa3_personal
 | 
			
		||||
    @pytest.mark.twog
 | 
			
		||||
    @allure.story('open 2.4 GHZ Band')
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa3_personal_ssid_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test, update_report,
 | 
			
		||||
                                   test_cases):
 | 
			
		||||
        """Client Connectivity open ssid 2.4G
 | 
			
		||||
@@ -321,6 +328,7 @@ class TestBridgeModeConnectivitySuiteB(object):
 | 
			
		||||
    @pytest.mark.wpa3_personal
 | 
			
		||||
    @pytest.mark.fiveg
 | 
			
		||||
    @allure.story('open 5 GHZ Band')
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa3_personal_ssid_5g(self, get_vif_state,station_names_fiveg, get_lanforge_data, lf_test, test_cases, update_report):
 | 
			
		||||
        """Client Connectivity open ssid 2.4G
 | 
			
		||||
           pytest -m "client_connectivity and bridge and general and wpa3_personal and fiveg"
 | 
			
		||||
@@ -354,6 +362,7 @@ class TestBridgeModeConnectivitySuiteB(object):
 | 
			
		||||
    @pytest.mark.wpa3_personal_mixed
 | 
			
		||||
    @pytest.mark.twog
 | 
			
		||||
    @allure.story('open 2.4 GHZ Band')
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa3_personal_mixed_ssid_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test,
 | 
			
		||||
                                         update_report,
 | 
			
		||||
                                         test_cases):
 | 
			
		||||
@@ -389,6 +398,7 @@ class TestBridgeModeConnectivitySuiteB(object):
 | 
			
		||||
    @pytest.mark.wpa3_personal_mixed
 | 
			
		||||
    @pytest.mark.fiveg
 | 
			
		||||
    @allure.story('open 5 GHZ Band')
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa3_personal_mixed_ssid_5g(self, get_vif_state,station_names_fiveg, get_lanforge_data, lf_test, test_cases,
 | 
			
		||||
                                         update_report):
 | 
			
		||||
        """Client Connectivity open ssid 2.4G
 | 
			
		||||
@@ -423,6 +433,7 @@ class TestBridgeModeConnectivitySuiteB(object):
 | 
			
		||||
    @pytest.mark.wpa_wpa2_personal_mixed
 | 
			
		||||
    @pytest.mark.twog
 | 
			
		||||
    @allure.story('wpa wpa2 personal mixed 2.4 GHZ Band')
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa_wpa2_personal_ssid_2g(self, get_vif_state,station_names_twog, setup_profiles, get_lanforge_data, lf_test,
 | 
			
		||||
                                       update_report,
 | 
			
		||||
                                       test_cases):
 | 
			
		||||
@@ -459,6 +470,7 @@ class TestBridgeModeConnectivitySuiteB(object):
 | 
			
		||||
    @pytest.mark.wpa_wpa2_personal_mixed
 | 
			
		||||
    @pytest.mark.fiveg
 | 
			
		||||
    @allure.story('wpa wpa2 personal mixed 5 GHZ Band')
 | 
			
		||||
    @allure.severity(allure.severity_level.CRITICAL)
 | 
			
		||||
    def test_wpa_wpa2_personal_ssid_5g(self, get_vif_state,station_names_fiveg, get_lanforge_data, lf_test, test_cases,
 | 
			
		||||
                                       update_report):
 | 
			
		||||
        """Client Connectivity open ssid 2.4G
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user