mirror of
https://github.com/Telecominfraproject/wlan-testing.git
synced 2025-10-29 01:52:40 +00:00
Update few DVLAN testcases to use vlan300 instead of vlan100 (#1070)
* Update DVLAN testcases Signed-off-by: bhargavi-ct <bhargavimamidipaka@candelatech.com> * Update DVLAN testcases to use vlan300 instead of vlan100 for few testcases Signed-off-by: bhargavi-ct <bhargavimamidipaka@candelatech.com> --------- Signed-off-by: bhargavi-ct <bhargavimamidipaka@candelatech.com> Co-authored-by: bhargavi-ct <bhargavimamidipaka@candelatech.com>
This commit is contained in:
@@ -45,119 +45,7 @@ setup_params_general = {
|
||||
scope="class"
|
||||
)
|
||||
@pytest.mark.usefixtures("setup_configuration")
|
||||
class TestDynamicVlan2GWpa2(object):
|
||||
|
||||
@pytest.mark.absence_of_radius_vlan_identifier
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
@pytest.mark.ow_sanity_lf
|
||||
@allure.title("Verify that SSID VLAN is used in the absence of radius VLAN tunnel type identifiers")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-5704", name="WIFI-5704")
|
||||
def test_ssid_vlan_in_the_absence_of_radius_vlan_identifier_2g_wpa2(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration, check_connectivity):
|
||||
"""
|
||||
|
||||
To verify that SSID VLAN is used in the absence of radius VLAN tunnel type identifiers
|
||||
Unique Marker: pytest -m " absence_of_radius_vlan_identifier and wpa2_enterprise and vlan"
|
||||
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
mode = "VLAN"
|
||||
security = "wpa2"
|
||||
extra_secu = []
|
||||
band = "twog"
|
||||
vlan = [100]
|
||||
ttls_passwd = "passwordvlannotsentuser"
|
||||
eap = "TTLS"
|
||||
identity = "vlannotsentuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name,
|
||||
security=security, extra_securities=extra_secu,
|
||||
vlan_id=vlan, mode=mode, band=band, eap=eap,
|
||||
ttls_passwd=ttls_passwd, ieee80211w=0, identity=identity,
|
||||
num_sta=1, dut_data=setup_configuration)
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
logging.info(f"station ip...{sta_ip_1}\neth.{vlan[0]}...{eth_vlan_ip}\neth_upstream_ip...{eth_ip}")
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
elif i == j:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
@pytest.mark.invalidradiusvlan
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.testcase(name="test_dynamic_invalid_vlan",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-5706")
|
||||
@allure.title("Test for invalid vlan identifier")
|
||||
def test_dynamic_invalid_vlan_2g_wpa2(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration, check_connectivity):
|
||||
"""
|
||||
pytest -m "invalidradiusvlan and wpa2_enterprise and vlan and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
mode = "VLAN"
|
||||
security = "wpa2"
|
||||
extra_secu = []
|
||||
band = "twog"
|
||||
vlan = [100]
|
||||
ttls_passwd = "passwordinvalidvlanuser"
|
||||
eap = "TTLS"
|
||||
identity = "invalidvlanuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
get_test_library.add_vlan(vlan_ids=[vlan])
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid = ssid_name,
|
||||
security = security, extra_securities = extra_secu, vlan_id = vlan,
|
||||
mode = mode, band = band, eap = eap, ttls_passwd = ttls_passwd,
|
||||
ieee80211w = 0, identity = identity, num_sta = 1, dut_data = setup_configuration)
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
else:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
class TestDynamicVlan2GWpa2SuiteA(object):
|
||||
|
||||
@pytest.mark.periodic_reauthentication
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@@ -230,59 +118,6 @@ class TestDynamicVlan2GWpa2(object):
|
||||
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.absenceofvlanid
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.testcase(name="test_ssid_vlan_used_in_absence_of_radius_vlan",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-5708")
|
||||
@allure.title("test for ssid vlan used in absence of radius vlan")
|
||||
def test_ssid_vlan_used_in_absence_of_radius_vlan_2g_wpa2(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration, check_connectivity):
|
||||
"""
|
||||
pytest -m "absenceofvlanid and wpa2_enterprise and vlan and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
mode = "VLAN"
|
||||
security = "wpa2"
|
||||
extra_secu = []
|
||||
band = "twog"
|
||||
vlan = [100]
|
||||
ttls_passwd = "passwordvlannotsentuser"
|
||||
eap = "TTLS"
|
||||
identity = "vlannotsentuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security,
|
||||
extra_securities=extra_secu, vlan_id=vlan, mode=mode, band=band, eap=eap,
|
||||
d_vlan=False, ttls_passwd=ttls_passwd, ieee80211w=0, identity=identity,
|
||||
num_sta=1, dut_data=setup_configuration)
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
else:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
@pytest.mark.outofboundvlanid
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
@@ -497,3 +332,208 @@ class TestDynamicVlan2GWpa2(object):
|
||||
assert False, result
|
||||
|
||||
assert passes == "PASS", result
|
||||
|
||||
|
||||
setup_params_general = {
|
||||
"mode": "VLAN",
|
||||
"ssid_modes": {
|
||||
"wpa2_enterprise": [
|
||||
{"ssid_name": "ssid_wpa2e_2g", "appliedRadios": ["2G"],
|
||||
"security_key": "something",
|
||||
"radius_auth_data": DYNAMIC_VLAN_RADIUS_SERVER_DATA,
|
||||
"radius_acc_data": DYNAMIC_VLAN_RADIUS_ACCOUNTING_DATA,
|
||||
"vlan": 300
|
||||
}]},
|
||||
"rf": {},
|
||||
"radius": True
|
||||
}
|
||||
|
||||
|
||||
# @allure.suite("regression")
|
||||
@allure.parent_suite("Dynamic VLAN Test")
|
||||
@allure.suite("WPA2 Enterprise Security")
|
||||
@allure.sub_suite("2.4 GHz Band")
|
||||
@allure.feature("Dynamic VLAN Test")
|
||||
@pytest.mark.parametrize(
|
||||
'setup_configuration',
|
||||
[setup_params_general],
|
||||
indirect=True,
|
||||
scope="class"
|
||||
)
|
||||
@pytest.mark.usefixtures("setup_configuration")
|
||||
class TestDynamicVlan2GWpa2SuiteB(object):
|
||||
|
||||
@pytest.mark.absence_of_radius_vlan_identifier
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
@pytest.mark.ow_sanity_lf
|
||||
@allure.title("Verify that SSID VLAN is used in the absence of radius VLAN tunnel type identifiers")
|
||||
@allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-5704", name="WIFI-5704")
|
||||
def test_ssid_vlan_in_the_absence_of_radius_vlan_identifier_2g_wpa2(self, get_test_library,
|
||||
get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations,
|
||||
setup_configuration, check_connectivity):
|
||||
"""
|
||||
|
||||
To verify that SSID VLAN is used in the absence of radius VLAN tunnel type identifiers
|
||||
Unique Marker: pytest -m " absence_of_radius_vlan_identifier and wpa2_enterprise and vlan"
|
||||
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
mode = "VLAN"
|
||||
security = "wpa2"
|
||||
extra_secu = []
|
||||
band = "twog"
|
||||
vlan = [300]
|
||||
ttls_passwd = "passwordvlannotsentuser"
|
||||
eap = "TTLS"
|
||||
identity = "vlannotsentuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name,
|
||||
security=security,
|
||||
extra_securities=extra_secu,
|
||||
vlan_id=vlan, mode=mode, band=band,
|
||||
eap=eap,
|
||||
ttls_passwd=ttls_passwd, ieee80211w=0,
|
||||
identity=identity,
|
||||
num_sta=1, dut_data=setup_configuration)
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
logging.info(f"station ip...{sta_ip_1}\neth.{vlan[0]}...{eth_vlan_ip}\neth_upstream_ip...{eth_ip}")
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
elif i == j:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
@pytest.mark.invalidradiusvlan
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.testcase(name="test_dynamic_invalid_vlan",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-5706")
|
||||
@allure.title("Test for invalid vlan identifier")
|
||||
def test_dynamic_invalid_vlan_2g_wpa2(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration, check_connectivity):
|
||||
"""
|
||||
pytest -m "invalidradiusvlan and wpa2_enterprise and vlan and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
mode = "VLAN"
|
||||
security = "wpa2"
|
||||
extra_secu = []
|
||||
band = "twog"
|
||||
vlan = [300]
|
||||
ttls_passwd = "passwordinvalidvlanuser"
|
||||
eap = "TTLS"
|
||||
identity = "invalidvlanuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
get_test_library.add_vlan(vlan_ids=[vlan])
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name,
|
||||
security=security,
|
||||
extra_securities=extra_secu, vlan_id=vlan,
|
||||
mode=mode, band=band, eap=eap,
|
||||
ttls_passwd=ttls_passwd,
|
||||
ieee80211w=0, identity=identity,
|
||||
num_sta=1, dut_data=setup_configuration)
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
else:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
@pytest.mark.absenceofvlanid
|
||||
@pytest.mark.wpa2_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.testcase(name="test_ssid_vlan_used_in_absence_of_radius_vlan",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-5708")
|
||||
@allure.title("test for ssid vlan used in absence of radius vlan")
|
||||
def test_ssid_vlan_used_in_absence_of_radius_vlan_2g_wpa2(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration,
|
||||
check_connectivity):
|
||||
"""
|
||||
pytest -m "absenceofvlanid and wpa2_enterprise and vlan and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
mode = "VLAN"
|
||||
security = "wpa2"
|
||||
extra_secu = []
|
||||
band = "twog"
|
||||
vlan = [300]
|
||||
ttls_passwd = "passwordvlannotsentuser"
|
||||
eap = "TTLS"
|
||||
identity = "vlannotsentuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security,
|
||||
extra_securities=extra_secu, vlan_id=vlan,
|
||||
mode=mode, band=band, eap=eap,
|
||||
d_vlan=False, ttls_passwd=ttls_passwd,
|
||||
ieee80211w=0, identity=identity,
|
||||
num_sta=1, dut_data=setup_configuration)
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
else:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
@@ -44,116 +44,7 @@ setup_params_general = {
|
||||
scope="class"
|
||||
)
|
||||
@pytest.mark.usefixtures("setup_configuration")
|
||||
class TestDynamicVlan5GWpa3(object):
|
||||
|
||||
@pytest.mark.absence_of_radius_vlan_identifier
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@allure.testcase(name="test_ssid_vlan_in_the_absence_of_radius_vlan_identifier",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-6095")
|
||||
@allure.title("Test for ssid vlan in the absence of radius vlan identifier")
|
||||
def test_ssid_vlan_in_the_absence_of_radius_vlan_identifier_5g_wpa3(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration, check_connectivity):
|
||||
"""
|
||||
pytest -m " absence_of_radius_vlan_identifier and wpa3_enterprise and vlan and fiveg"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
security = "wpa3"
|
||||
extra_secu = []
|
||||
band = "fiveg"
|
||||
mode = "VLAN"
|
||||
vlan = [100]
|
||||
ttls_passwd = "passwordvlannotsentuser"
|
||||
eap = "TTLS"
|
||||
identity = "vlannotsentuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security,
|
||||
extra_securities=extra_secu, vlan_id=vlan,
|
||||
mode=mode, band=band, eap=eap,
|
||||
ttls_passwd=ttls_passwd, ieee80211w=0,
|
||||
identity=identity, num_sta=1, key_mgmt="WPA-EAP-SHA256",
|
||||
dut_data=setup_configuration)
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
logging.info(f"station ip...{sta_ip_1}\neth.{vlan[0]}...{eth_vlan_ip}\neth_upstream_ip...{eth_ip}")
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
elif i == j:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
@pytest.mark.invalidradiusvlan
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@allure.testcase(name="test_dynamic_invalid_vlan",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-6097")
|
||||
@allure.title("Test for invalid vlan identifier")
|
||||
def test_dynamic_invalid_vlan_5g_wpa3(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration, check_connectivity):
|
||||
"""
|
||||
pytest -m "invalidradiusvlan and wpa3_enterprise and vlan and fiveg"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
security = "wpa3"
|
||||
extra_secu = []
|
||||
band = "fiveg"
|
||||
mode = "VLAN"
|
||||
vlan = [100]
|
||||
ttls_passwd = "passwordinvalidvlanuser"
|
||||
eap = "TTLS"
|
||||
identity = "invalidvlanuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
get_test_library.add_vlan(vlan_ids=[vlan])
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid = ssid_name, key_mgmt="WPA-EAP-SHA256",
|
||||
security = security, extra_securities = extra_secu, vlan_id = vlan,
|
||||
mode = mode, band = band, eap = eap, ttls_passwd = ttls_passwd,
|
||||
ieee80211w = 0, identity = identity, num_sta = 1, dut_data = setup_configuration)
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
else:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
class TestDynamicVlan5GWpa3SuiteA(object):
|
||||
@pytest.mark.periodic_reauthentication
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@@ -224,59 +115,6 @@ class TestDynamicVlan5GWpa3(object):
|
||||
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.absenceofvlanid
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@allure.testcase(name="test_ssid_vlan_used_in_absence_of_radius_vlan",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-6100")
|
||||
@allure.title("test for ssid vlan used in absence of radius vlan")
|
||||
def test_ssid_vlan_used_in_absence_of_radius_vlan_5g_wpa3(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration, check_connectivity):
|
||||
"""
|
||||
pytest -m "absenceofvlanid and wpa3_enterprise and vlan and fiveg"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
security = "wpa3"
|
||||
extra_secu = []
|
||||
band = "fiveg"
|
||||
mode = "VLAN"
|
||||
vlan = [100]
|
||||
ttls_passwd = "passwordvlannotsentuser"
|
||||
eap = "TTLS"
|
||||
identity = "vlannotsentuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security,
|
||||
extra_securities=extra_secu, vlan_id=vlan, mode=mode, band=band, eap=eap,
|
||||
d_vlan=False, ttls_passwd=ttls_passwd, ieee80211w=0, identity=identity,
|
||||
num_sta=1, dut_data=setup_configuration, key_mgmt="WPA-EAP-SHA256")
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
else:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
@pytest.mark.outofboundvlanid
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@@ -489,3 +327,197 @@ class TestDynamicVlan5GWpa3(object):
|
||||
assert False, result
|
||||
|
||||
assert passes == "PASS", result
|
||||
|
||||
|
||||
setup_params_general = {
|
||||
"mode": "VLAN",
|
||||
"ssid_modes": {
|
||||
"wpa3_enterprise": [
|
||||
{"ssid_name": "ssid_wpa3e_5g", "appliedRadios": ["5G"],
|
||||
"security_key": "something",
|
||||
"radius_auth_data": DYNAMIC_VLAN_RADIUS_SERVER_DATA,
|
||||
"radius_acc_data": DYNAMIC_VLAN_RADIUS_ACCOUNTING_DATA,
|
||||
"vlan": 300
|
||||
}]},
|
||||
"rf": {},
|
||||
"radius": True
|
||||
}
|
||||
|
||||
|
||||
@allure.parent_suite("Dynamic VLAN Test")
|
||||
@allure.suite("WPA3 Enterprise Security")
|
||||
@allure.sub_suite("5 GHz Band")
|
||||
@allure.feature("Dynamic VLAN Test")
|
||||
@pytest.mark.parametrize(
|
||||
'setup_configuration',
|
||||
[setup_params_general],
|
||||
indirect=True,
|
||||
scope="class"
|
||||
)
|
||||
@pytest.mark.usefixtures("setup_configuration")
|
||||
class TestDynamicVlan5GWpa3SuiteB(object):
|
||||
|
||||
@pytest.mark.absence_of_radius_vlan_identifier
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@allure.testcase(name="test_ssid_vlan_in_the_absence_of_radius_vlan_identifier",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-6095")
|
||||
@allure.title("Test for ssid vlan in the absence of radius vlan identifier")
|
||||
def test_ssid_vlan_in_the_absence_of_radius_vlan_identifier_5g_wpa3(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration, check_connectivity):
|
||||
"""
|
||||
pytest -m " absence_of_radius_vlan_identifier and wpa3_enterprise and vlan and fiveg"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
security = "wpa3"
|
||||
extra_secu = []
|
||||
band = "fiveg"
|
||||
mode = "VLAN"
|
||||
vlan = [300]
|
||||
ttls_passwd = "passwordvlannotsentuser"
|
||||
eap = "TTLS"
|
||||
identity = "vlannotsentuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security,
|
||||
extra_securities=extra_secu, vlan_id=vlan,
|
||||
mode=mode, band=band, eap=eap,
|
||||
ttls_passwd=ttls_passwd, ieee80211w=0,
|
||||
identity=identity, num_sta=1, key_mgmt="WPA-EAP-SHA256",
|
||||
dut_data=setup_configuration)
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
logging.info(f"station ip...{sta_ip_1}\neth.{vlan[0]}...{eth_vlan_ip}\neth_upstream_ip...{eth_ip}")
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
elif i == j:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
@pytest.mark.invalidradiusvlan
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@allure.testcase(name="test_dynamic_invalid_vlan",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-6097")
|
||||
@allure.title("Test for invalid vlan identifier")
|
||||
def test_dynamic_invalid_vlan_5g_wpa3(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration, check_connectivity):
|
||||
"""
|
||||
pytest -m "invalidradiusvlan and wpa3_enterprise and vlan and fiveg"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
security = "wpa3"
|
||||
extra_secu = []
|
||||
band = "fiveg"
|
||||
mode = "VLAN"
|
||||
vlan = [300]
|
||||
ttls_passwd = "passwordinvalidvlanuser"
|
||||
eap = "TTLS"
|
||||
identity = "invalidvlanuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
get_test_library.add_vlan(vlan_ids=[vlan])
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid = ssid_name, key_mgmt="WPA-EAP-SHA256",
|
||||
security = security, extra_securities = extra_secu, vlan_id = vlan,
|
||||
mode = mode, band = band, eap = eap, ttls_passwd = ttls_passwd,
|
||||
ieee80211w = 0, identity = identity, num_sta = 1, dut_data = setup_configuration)
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
else:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
@pytest.mark.absenceofvlanid
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.fiveg
|
||||
@allure.testcase(name="test_ssid_vlan_used_in_absence_of_radius_vlan",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-6100")
|
||||
@allure.title("test for ssid vlan used in absence of radius vlan")
|
||||
def test_ssid_vlan_used_in_absence_of_radius_vlan_5g_wpa3(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration,
|
||||
check_connectivity):
|
||||
"""
|
||||
pytest -m "absenceofvlanid and wpa3_enterprise and vlan and fiveg"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
security = "wpa3"
|
||||
extra_secu = []
|
||||
band = "fiveg"
|
||||
mode = "VLAN"
|
||||
vlan = [300]
|
||||
ttls_passwd = "passwordvlannotsentuser"
|
||||
eap = "TTLS"
|
||||
identity = "vlannotsentuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security,
|
||||
extra_securities=extra_secu, vlan_id=vlan,
|
||||
mode=mode, band=band, eap=eap,
|
||||
d_vlan=False, ttls_passwd=ttls_passwd,
|
||||
ieee80211w=0, identity=identity,
|
||||
num_sta=1, dut_data=setup_configuration,
|
||||
key_mgmt="WPA-EAP-SHA256")
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
else:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
@@ -44,117 +44,7 @@ setup_params_general = {
|
||||
scope="class"
|
||||
)
|
||||
@pytest.mark.usefixtures("setup_configuration")
|
||||
class TestDynamicVlan2GWpa3(object):
|
||||
|
||||
@pytest.mark.absence_of_radius_vlan_identifier
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.testcase(name="test_ssid_vlan_in_the_absence_of_radius_vlan_identifier",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-6095")
|
||||
@allure.title("Test for ssid vlan in the absence of radius vlan identifier")
|
||||
def test_ssid_vlan_in_the_absence_of_radius_vlan_identifier_2g_wpa3(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration, check_connectivity):
|
||||
"""
|
||||
pytest -m "absence_of_radius_vlan_identifier and wpa3_enterprise and vlan and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
mode = "VLAN"
|
||||
security = "wpa3"
|
||||
extra_secu = []
|
||||
band = "twog"
|
||||
vlan = [100]
|
||||
ttls_passwd = "passwordvlannotsentuser"
|
||||
eap = "TTLS"
|
||||
identity = "vlannotsentuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, key_mgmt="WPA-EAP-SHA256",
|
||||
security=security, extra_securities=extra_secu,
|
||||
vlan_id=vlan, mode=mode, band=band, eap=eap,
|
||||
ttls_passwd=ttls_passwd, ieee80211w=0, identity=identity,
|
||||
num_sta=1, dut_data=setup_configuration)
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
logging.info(f"station ip...{sta_ip_1}\neth.{vlan[0]}...{eth_vlan_ip}\neth_upstream_ip...{eth_ip}")
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
elif i == j:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
@pytest.mark.invalidradiusvlan
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.testcase(name="test_dynamic_invalid_vlan",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-6097")
|
||||
@allure.title("Test for invalid vlan identifier")
|
||||
def test_dynamic_invalid_vlan_2g_wpa3(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration, check_connectivity):
|
||||
"""
|
||||
pytest -m "invalidradiusvlan and wpa3_enterprise and vlan and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
mode = "VLAN"
|
||||
security = "wpa3"
|
||||
extra_secu = []
|
||||
band = "twog"
|
||||
vlan = [100]
|
||||
ttls_passwd = "passwordinvalidvlanuser"
|
||||
eap = "TTLS"
|
||||
identity = "invalidvlanuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
get_test_library.add_vlan(vlan_ids=[vlan])
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid = ssid_name, key_mgmt="WPA-EAP-SHA256",
|
||||
security = security, extra_securities = extra_secu, vlan_id = vlan,
|
||||
mode = mode, band = band, eap = eap, ttls_passwd = ttls_passwd,
|
||||
ieee80211w = 0, identity = identity, num_sta = 1, dut_data = setup_configuration)
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
else:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
class TestDynamicVlan2GWpa3SuiteA(object):
|
||||
@pytest.mark.periodic_reauthentication
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
@@ -225,59 +115,6 @@ class TestDynamicVlan2GWpa3(object):
|
||||
|
||||
assert passes == "PASS", result
|
||||
|
||||
@pytest.mark.absenceofvlanid
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.testcase(name="test_ssid_vlan_used_in_absence_of_radius_vlan",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-6100")
|
||||
@allure.title("test for ssid vlan used in absence of radius vlan")
|
||||
def test_ssid_vlan_used_in_absence_of_radius_vlan_2g_wpa3(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration, check_connectivity):
|
||||
"""
|
||||
pytest -m "absenceofvlanid and wpa3_enterprise and vlan and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
mode = "VLAN"
|
||||
security = "wpa3"
|
||||
extra_secu = []
|
||||
band = "twog"
|
||||
vlan = [100]
|
||||
ttls_passwd = "passwordvlannotsentuser"
|
||||
eap = "TTLS"
|
||||
identity = "vlannotsentuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security,
|
||||
extra_securities=extra_secu, vlan_id=vlan, mode=mode, band=band, eap=eap,
|
||||
d_vlan=False, ttls_passwd=ttls_passwd, ieee80211w=0, identity=identity,
|
||||
num_sta=1, dut_data=setup_configuration, key_mgmt="WPA-EAP-SHA256")
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
else:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
@pytest.mark.outofboundvlanid
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
@@ -492,3 +329,205 @@ class TestDynamicVlan2GWpa3(object):
|
||||
|
||||
assert passes == "PASS", result
|
||||
|
||||
|
||||
setup_params_general = {
|
||||
"mode": "VLAN",
|
||||
"ssid_modes": {
|
||||
"wpa3_enterprise": [
|
||||
{"ssid_name": "ssid_wpa3e_2g", "appliedRadios": ["2G"],
|
||||
"security_key": "something",
|
||||
"radius_auth_data": DYNAMIC_VLAN_RADIUS_SERVER_DATA,
|
||||
"radius_acc_data": DYNAMIC_VLAN_RADIUS_ACCOUNTING_DATA,
|
||||
"vlan": 300
|
||||
}]},
|
||||
"rf": {},
|
||||
"radius": True
|
||||
}
|
||||
|
||||
|
||||
@allure.parent_suite("Dynamic VLAN Test")
|
||||
@allure.suite("WPA3 Enterprise Security")
|
||||
@allure.sub_suite("2.4 GHz Band")
|
||||
@allure.feature("Dynamic VLAN Test")
|
||||
@pytest.mark.parametrize(
|
||||
'setup_configuration',
|
||||
[setup_params_general],
|
||||
indirect=True,
|
||||
scope="class"
|
||||
)
|
||||
@pytest.mark.usefixtures("setup_configuration")
|
||||
class TestDynamicVlan2GWpa3SuiteB(object):
|
||||
|
||||
@pytest.mark.absence_of_radius_vlan_identifier
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.testcase(name="test_ssid_vlan_in_the_absence_of_radius_vlan_identifier",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-6095")
|
||||
@allure.title("Test for ssid vlan in the absence of radius vlan identifier")
|
||||
def test_ssid_vlan_in_the_absence_of_radius_vlan_identifier_2g_wpa3(self, get_test_library,
|
||||
get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations,
|
||||
setup_configuration, check_connectivity):
|
||||
"""
|
||||
pytest -m "absence_of_radius_vlan_identifier and wpa3_enterprise and vlan and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
mode = "VLAN"
|
||||
security = "wpa3"
|
||||
extra_secu = []
|
||||
band = "twog"
|
||||
vlan = [300]
|
||||
ttls_passwd = "passwordvlannotsentuser"
|
||||
eap = "TTLS"
|
||||
identity = "vlannotsentuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, key_mgmt="WPA-EAP-SHA256",
|
||||
security=security,
|
||||
extra_securities=extra_secu,
|
||||
vlan_id=vlan, mode=mode, band=band,
|
||||
eap=eap,
|
||||
ttls_passwd=ttls_passwd, ieee80211w=0,
|
||||
identity=identity,
|
||||
num_sta=1, dut_data=setup_configuration)
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
logging.info(f"station ip...{sta_ip_1}\neth.{vlan[0]}...{eth_vlan_ip}\neth_upstream_ip...{eth_ip}")
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
elif i == j:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
@pytest.mark.invalidradiusvlan
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.testcase(name="test_dynamic_invalid_vlan",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-6097")
|
||||
@allure.title("Test for invalid vlan identifier")
|
||||
def test_dynamic_invalid_vlan_2g_wpa3(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration, check_connectivity):
|
||||
"""
|
||||
pytest -m "invalidradiusvlan and wpa3_enterprise and vlan and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
mode = "VLAN"
|
||||
security = "wpa3"
|
||||
extra_secu = []
|
||||
band = "twog"
|
||||
vlan = [300]
|
||||
ttls_passwd = "passwordinvalidvlanuser"
|
||||
eap = "TTLS"
|
||||
identity = "invalidvlanuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
get_test_library.add_vlan(vlan_ids=[vlan])
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, key_mgmt="WPA-EAP-SHA256",
|
||||
security=security,
|
||||
extra_securities=extra_secu, vlan_id=vlan,
|
||||
mode=mode, band=band, eap=eap,
|
||||
ttls_passwd=ttls_passwd,
|
||||
ieee80211w=0, identity=identity,
|
||||
num_sta=1, dut_data=setup_configuration)
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
else:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
@pytest.mark.absenceofvlanid
|
||||
@pytest.mark.wpa3_enterprise
|
||||
@pytest.mark.twog
|
||||
@allure.testcase(name="test_ssid_vlan_used_in_absence_of_radius_vlan",
|
||||
url="https://telecominfraproject.atlassian.net/browse/WIFI-6100")
|
||||
@allure.title("test for ssid vlan used in absence of radius vlan")
|
||||
def test_ssid_vlan_used_in_absence_of_radius_vlan_2g_wpa3(self, get_test_library, get_dut_logs_per_test_case,
|
||||
get_test_device_logs, num_stations, setup_configuration,
|
||||
check_connectivity):
|
||||
"""
|
||||
pytest -m "absenceofvlanid and wpa3_enterprise and vlan and twog"
|
||||
"""
|
||||
|
||||
profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"]
|
||||
ssid_name = profile_data[0]["ssid_name"]
|
||||
mode = "VLAN"
|
||||
security = "wpa3"
|
||||
extra_secu = []
|
||||
band = "twog"
|
||||
vlan = [300]
|
||||
ttls_passwd = "passwordvlannotsentuser"
|
||||
eap = "TTLS"
|
||||
identity = "vlannotsentuser"
|
||||
val = ""
|
||||
port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.')
|
||||
|
||||
passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security,
|
||||
extra_securities=extra_secu, vlan_id=vlan,
|
||||
mode=mode, band=band, eap=eap,
|
||||
d_vlan=False, ttls_passwd=ttls_passwd,
|
||||
ieee80211w=0, identity=identity,
|
||||
num_sta=1, dut_data=setup_configuration,
|
||||
key_mgmt="WPA-EAP-SHA256")
|
||||
|
||||
station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip']
|
||||
eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"]
|
||||
eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] +
|
||||
"/" + port_resources[2])["interface"]["ip"]
|
||||
|
||||
sta_ip_1 = station_ip.split('.')
|
||||
eth_vlan_ip_1 = eth_vlan_ip.split('.')
|
||||
if sta_ip_1[0] == "0":
|
||||
assert False, result
|
||||
elif eth_vlan_ip[0] == "0":
|
||||
assert False, result
|
||||
|
||||
for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]):
|
||||
if i != j:
|
||||
val = False
|
||||
else:
|
||||
val = True
|
||||
if val:
|
||||
assert True, result
|
||||
elif not val:
|
||||
assert False, result
|
||||
|
||||
|
||||
Reference in New Issue
Block a user