mirror of
https://github.com/Telecominfraproject/wlan-testing.git
synced 2025-11-03 04:18:15 +00:00
setup_profiles for 2.x added functionality - bssid band ssid mapping for lf dut get_vif_state fixture adjustments for 2.x (posibbly changing the naming convention in next commit) lf_tests synced up with master branch lf_tools synced up with master added a ssid_list in lf_tools, it will be updated and used on a class level for verification of ssid availability in each test case Signed-off-by: shivamcandela <shivam.thakur@candelatech.com>
949 lines
51 KiB
Python
949 lines
51 KiB
Python
import json
|
|
import os
|
|
import sys
|
|
|
|
sys.path.append(
|
|
os.path.dirname(
|
|
os.path.realpath(__file__)
|
|
)
|
|
)
|
|
if "libs" not in sys.path:
|
|
sys.path.append(f'../libs')
|
|
|
|
from controller.controller import ProfileUtility
|
|
from controller.ucentral_ctlr import UProfileUtility
|
|
import time
|
|
from lanforge.lf_tests import RunTest
|
|
from lanforge.lf_tools import ChamberView
|
|
import pytest
|
|
import allure
|
|
|
|
|
|
@pytest.fixture(scope="session")
|
|
def instantiate_profile(request):
|
|
if request.config.getoption("1.x"):
|
|
yield ProfileUtility
|
|
else:
|
|
yield UProfileUtility
|
|
|
|
|
|
@pytest.fixture(scope="session")
|
|
def lf_tools(get_configuration, testbed):
|
|
lf_tools_obj = ChamberView(lanforge_data=get_configuration['traffic_generator']['details'],
|
|
access_point_data=get_configuration['access_point'],
|
|
testbed=testbed)
|
|
yield lf_tools_obj
|
|
|
|
|
|
@pytest.fixture(scope="session")
|
|
def create_lanforge_chamberview(lf_tools):
|
|
scenario_object, scenario_name = lf_tools.Chamber_View()
|
|
return scenario_name
|
|
|
|
|
|
@pytest.fixture(scope="session")
|
|
def create_lanforge_chamberview_dut(lf_tools):
|
|
dut_object, dut_name = lf_tools.Create_Dut()
|
|
return dut_name
|
|
|
|
|
|
@pytest.fixture(scope="session")
|
|
def setup_vlan():
|
|
vlan_id = [100]
|
|
allure.attach(body=str(vlan_id), name="VLAN Created: ")
|
|
yield vlan_id[0]
|
|
|
|
|
|
@pytest.fixture(scope="class")
|
|
def setup_profiles(request, setup_controller, testbed, setup_vlan, get_equipment_id,
|
|
instantiate_profile, get_markers, create_lanforge_chamberview_dut, lf_tools,
|
|
get_security_flags, get_configuration, radius_info, get_apnos, radius_accounting_info):
|
|
if request.config.getoption("1.x"):
|
|
instantiate_profile = instantiate_profile(sdk_client=setup_controller)
|
|
vlan_id, mode = 0, 0
|
|
instantiate_profile.cleanup_objects()
|
|
parameter = dict(request.param)
|
|
print(parameter)
|
|
test_cases = {}
|
|
profile_data = {}
|
|
if parameter['mode'] not in ["BRIDGE", "NAT", "VLAN"]:
|
|
print("Invalid Mode: ", parameter['mode'])
|
|
allure.attach(body=parameter['mode'], name="Invalid Mode: ")
|
|
yield test_cases
|
|
|
|
if parameter['mode'] == "NAT":
|
|
mode = "NAT"
|
|
vlan_id = 1
|
|
if parameter['mode'] == "BRIDGE":
|
|
mode = "BRIDGE"
|
|
vlan_id = 1
|
|
if parameter['mode'] == "VLAN":
|
|
mode = "BRIDGE"
|
|
vlan_id = setup_vlan
|
|
|
|
instantiate_profile.delete_profile_by_name(profile_name=testbed + "-Equipment-AP-" + parameter['mode'])
|
|
|
|
profile_data["equipment_ap"] = {"profile_name": testbed + "-Equipment-AP-" + parameter['mode']}
|
|
profile_data["ssid"] = {}
|
|
for i in parameter["ssid_modes"]:
|
|
profile_data["ssid"][i] = []
|
|
for j in range(len(parameter["ssid_modes"][i])):
|
|
profile_name = testbed + "-SSID-" + i + "-" + str(j) + "-" + parameter['mode']
|
|
data = parameter["ssid_modes"][i][j]
|
|
data["profile_name"] = profile_name
|
|
if "mode" not in dict(data).keys():
|
|
data["mode"] = mode
|
|
if "vlan" not in dict(data).keys():
|
|
data["vlan"] = vlan_id
|
|
instantiate_profile.delete_profile_by_name(profile_name=profile_name)
|
|
profile_data["ssid"][i].append(data)
|
|
# print(profile_name)
|
|
# print(profile_data)
|
|
|
|
instantiate_profile.delete_profile_by_name(profile_name=testbed + "-Automation-Radius-Profile-" + mode)
|
|
time.sleep(10)
|
|
"""
|
|
Setting up rf profile
|
|
"""
|
|
rf_profile_data = {
|
|
"name": "RF-Profile-" + testbed + "-" + parameter['mode'] + "-" +
|
|
get_configuration['access_point'][0]['mode']
|
|
}
|
|
|
|
for i in parameter["rf"]:
|
|
rf_profile_data[i] = parameter['rf'][i]
|
|
# print(rf_profile_data)
|
|
|
|
try:
|
|
instantiate_profile.delete_profile_by_name(profile_name=rf_profile_data['name'])
|
|
instantiate_profile.set_rf_profile(profile_data=rf_profile_data,
|
|
mode=get_configuration['access_point'][0]['mode'])
|
|
allure.attach(body=str(rf_profile_data),
|
|
name="RF Profile Created : " + get_configuration['access_point'][0]['mode'])
|
|
except Exception as e:
|
|
print(e)
|
|
allure.attach(body=str(e), name="Exception ")
|
|
|
|
# Radius Profile Creation
|
|
if parameter["radius"]:
|
|
radius_info = radius_info
|
|
radius_info["name"] = testbed + "-Automation-Radius-Profile-" + mode
|
|
instantiate_profile.delete_profile_by_name(profile_name=testbed + "-Automation-Radius-Profile-" + mode)
|
|
try:
|
|
instantiate_profile.create_radius_profile(radius_info=radius_info)
|
|
allure.attach(body=str(radius_info),
|
|
name="Radius Profile Created")
|
|
test_cases['radius_profile'] = True
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases['radius_profile'] = False
|
|
|
|
# SSID Profile Creation
|
|
lf_dut_data = []
|
|
for mode in profile_data['ssid']:
|
|
if mode == "open":
|
|
for j in profile_data["ssid"][mode]:
|
|
# print(j)
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
for i in range(len(j["appliedRadios"])):
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GU", "is5GHzU")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GL", "is5GHzL")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5G", "is5GHz")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("2G", "is2dot4GHz")
|
|
creates_profile = instantiate_profile.create_open_ssid_profile(profile_data=j)
|
|
test_cases["open_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["open_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
|
|
if mode == "wpa":
|
|
for j in profile_data["ssid"][mode]:
|
|
# print(j)
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
for i in range(len(j["appliedRadios"])):
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GU", "is5GHzU")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GL", "is5GHzL")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5G", "is5GHz")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("2G", "is2dot4GHz")
|
|
creates_profile = instantiate_profile.create_wpa_ssid_profile(profile_data=j)
|
|
test_cases["wpa_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
|
|
if mode == "wpa2_personal":
|
|
for j in profile_data["ssid"][mode]:
|
|
# print(j)
|
|
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
for i in range(len(j["appliedRadios"])):
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GU", "is5GHzU")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GL", "is5GHzL")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5G", "is5GHz")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("2G", "is2dot4GHz")
|
|
creates_profile = instantiate_profile.create_wpa2_personal_ssid_profile(profile_data=j)
|
|
test_cases["wpa2_personal_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa2_personal_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
|
|
if mode == "wpa_wpa2_personal_mixed":
|
|
for j in profile_data["ssid"][mode]:
|
|
# print(j)
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
for i in range(len(j["appliedRadios"])):
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GU", "is5GHzU")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GL", "is5GHzL")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5G", "is5GHz")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("2G", "is2dot4GHz")
|
|
|
|
creates_profile = instantiate_profile.create_wpa_wpa2_personal_mixed_ssid_profile(
|
|
profile_data=j)
|
|
test_cases["wpa_wpa2_personal_mixed_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa_wpa2_personal_mixed_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
|
|
if mode == "wpa3_personal":
|
|
for j in profile_data["ssid"][mode]:
|
|
print(j)
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
for i in range(len(j["appliedRadios"])):
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GU", "is5GHzU")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GL", "is5GHzL")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5G", "is5GHz")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("2G", "is2dot4GHz")
|
|
|
|
creates_profile = instantiate_profile.create_wpa3_personal_ssid_profile(profile_data=j)
|
|
test_cases["wpa3_personal_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa3_personal_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
if mode == "wpa3_personal_mixed":
|
|
for j in profile_data["ssid"][mode]:
|
|
print(j)
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
for i in range(len(j["appliedRadios"])):
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GU", "is5GHzU")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GL", "is5GHzL")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5G", "is5GHz")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("2G", "is2dot4GHz")
|
|
creates_profile = instantiate_profile.create_wpa3_personal_mixed_ssid_profile(
|
|
profile_data=j)
|
|
test_cases["wpa3_personal_mixed_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa3_personal_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
|
|
if mode == "wpa_enterprise":
|
|
for j in profile_data["ssid"][mode]:
|
|
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
for i in range(len(j["appliedRadios"])):
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GU", "is5GHzU")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GL", "is5GHzL")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5G", "is5GHz")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("2G", "is2dot4GHz")
|
|
creates_profile = instantiate_profile.create_wpa_enterprise_ssid_profile(profile_data=j)
|
|
test_cases["wpa_enterprise_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa_enterprise_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
if mode == "wpa2_enterprise":
|
|
for j in profile_data["ssid"][mode]:
|
|
# print(j)
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
for i in range(len(j["appliedRadios"])):
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GU", "is5GHzU")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GL", "is5GHzL")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5G", "is5GHz")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("2G", "is2dot4GHz")
|
|
creates_profile = instantiate_profile.create_wpa2_enterprise_ssid_profile(profile_data=j)
|
|
test_cases["wpa2_enterprise_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa2_enterprise_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
if mode == "wpa3_enterprise":
|
|
for j in profile_data["ssid"][mode]:
|
|
# print(j)
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
for i in range(len(j["appliedRadios"])):
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GU", "is5GHzU")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GL", "is5GHzL")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5G", "is5GHz")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("2G", "is2dot4GHz")
|
|
creates_profile = instantiate_profile.create_wpa3_enterprise_ssid_profile(profile_data=j)
|
|
test_cases["wpa3_enterprise_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa3_enterprise_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
|
|
if mode == "wpa_wpa2_enterprise_mixed":
|
|
for j in profile_data["ssid"][mode]:
|
|
# print(j)
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
for i in range(len(j["appliedRadios"])):
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GU", "is5GHzU")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GL", "is5GHzL")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5G", "is5GHz")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("2G", "is2dot4GHz")
|
|
creates_profile = instantiate_profile.create_wpa_wpa2_enterprise_mixed_ssid_profile(
|
|
profile_data=j)
|
|
test_cases["wpa_wpa2_enterprise_mixed_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa_wpa2_enterprise_mixed_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
if mode == "wpa3_enterprise_mixed":
|
|
for j in profile_data["ssid"][mode]:
|
|
# print(j)
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
for i in range(len(j["appliedRadios"])):
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GU", "is5GHzU")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GL", "is5GHzL")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5G", "is5GHz")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("2G", "is2dot4GHz")
|
|
creates_profile = instantiate_profile.create_wpa3_enterprise_mixed_ssid_profile(
|
|
profile_data=j)
|
|
test_cases["wpa3_enterprise_mixed_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa3_enterprise_mixed_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
|
|
if mode == "wep":
|
|
for j in profile_data["ssid"][mode]:
|
|
# print(j)
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
for i in range(len(j["appliedRadios"])):
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GU", "is5GHzU")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5GL", "is5GHzL")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("5G", "is5GHz")
|
|
j["appliedRadios"][i] = j["appliedRadios"][i].replace("2G", "is2dot4GHz")
|
|
creates_profile = instantiate_profile.create_wep_ssid_profile(profile_data=j)
|
|
test_cases["wpa3_enterprise_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa3_enterprise_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
# Equipment AP Profile Creation
|
|
try:
|
|
instantiate_profile.set_ap_profile(profile_data=profile_data['equipment_ap'])
|
|
test_cases["equipment_ap"] = True
|
|
allure.attach(body=str(profile_data['equipment_ap']),
|
|
name="Equipment AP Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["equipment_ap"] = False
|
|
allure.attach(body=str(e),
|
|
name="Equipment AP Profile Creation Failed")
|
|
|
|
# Push the Equipment AP Profile to AP
|
|
try:
|
|
for i in get_equipment_id:
|
|
instantiate_profile.push_profile_old_method(equipment_id=i)
|
|
except Exception as e:
|
|
print(e)
|
|
print("failed to create AP Profile")
|
|
|
|
ap_ssh = get_apnos(get_configuration['access_point'][0], pwd="../libs/apnos/")
|
|
# ssid_names = []
|
|
# for i in instantiate_profile.profile_creation_ids["ssid"]:
|
|
# ssid_names.append(instantiate_profile.get_ssid_name_by_profile_id(profile_id=i))
|
|
# ssid_names.sort()
|
|
ssid_names = []
|
|
for i in lf_dut_data:
|
|
ssid_names.append(i["ssid_name"])
|
|
ssid_names.sort()
|
|
# This loop will check the VIF Config with cloud profile
|
|
vif_config = []
|
|
test_cases['vifc'] = False
|
|
for i in range(0, 18):
|
|
vif_config = list(ap_ssh.get_vif_config_ssids())
|
|
vif_config.sort()
|
|
print(vif_config)
|
|
print(ssid_names)
|
|
if ssid_names == vif_config:
|
|
test_cases['vifc'] = True
|
|
break
|
|
time.sleep(10)
|
|
allure.attach(
|
|
body=str("VIF Config: " + str(vif_config) + "\n" + "SSID Pushed from Controller: " + str(ssid_names)),
|
|
name="SSID Profiles in VIF Config and Controller: ")
|
|
ap_ssh = get_apnos(get_configuration['access_point'][0], pwd="../libs/apnos/")
|
|
|
|
# This loop will check the VIF Config with VIF State
|
|
test_cases['vifs'] = False
|
|
for i in range(0, 18):
|
|
vif_state = list(ap_ssh.get_vif_state_ssids())
|
|
vif_state.sort()
|
|
vif_config = list(ap_ssh.get_vif_config_ssids())
|
|
vif_config.sort()
|
|
print(vif_config)
|
|
print(vif_state)
|
|
if vif_state == vif_config:
|
|
test_cases['vifs'] = True
|
|
break
|
|
time.sleep(10)
|
|
allure.attach(body=str("VIF Config: " + str(vif_config) + "\n" + "VIF State: " + str(vif_state)),
|
|
name="SSID Profiles in VIF Config and VIF State: ")
|
|
|
|
ap_logs = ap_ssh.logread()
|
|
allure.attach(body=ap_logs, name="AP LOgs: ")
|
|
ssid_info = ap_ssh.get_ssid_info()
|
|
ssid_data = []
|
|
print(ssid_info)
|
|
band_mapping = ap_ssh.get_bssid_band_mapping()
|
|
print(band_mapping)
|
|
idx_mapping = {}
|
|
for i in range(0, len(ssid_info)):
|
|
if ssid_info[i][1] == "OPEN":
|
|
ssid_info[i].append("")
|
|
if ssid_info[i][1] == "OPEN":
|
|
ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=OPEN" +
|
|
" password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
|
|
idx_mapping[str(i)] = [ssid_info[i][3], ssid_info[i][2], ssid_info[i][1], band_mapping[ssid_info[i][0]],
|
|
ssid_info[i][0]]
|
|
|
|
if ssid_info[i][1] == "WPA":
|
|
ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=WPA" +
|
|
" password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
|
|
idx_mapping[str(i)] = [ssid_info[i][3], ssid_info[i][2], ssid_info[i][1], band_mapping[ssid_info[i][0]],
|
|
ssid_info[i][0]]
|
|
if ssid_info[i][1] == "WPA2":
|
|
ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=WPA2" +
|
|
" password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
|
|
idx_mapping[str(i)] = [ssid_info[i][3], ssid_info[i][2], ssid_info[i][1], band_mapping[ssid_info[i][0]],
|
|
ssid_info[i][0]]
|
|
if ssid_info[i][1] == "WPA3_PERSONAL":
|
|
ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=WPA3" +
|
|
" password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
|
|
idx_mapping[str(i)] = [ssid_info[i][3], ssid_info[i][2], ssid_info[i][1], band_mapping[ssid_info[i][0]],
|
|
ssid_info[i][0]]
|
|
|
|
if ssid_info[i][1] == "WPA | WPA2":
|
|
ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=WPA|WPA2" +
|
|
" password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
|
|
idx_mapping[str(i)] = [ssid_info[i][3], ssid_info[i][2], ssid_info[i][1], band_mapping[ssid_info[i][0]],
|
|
ssid_info[i][0]]
|
|
|
|
if ssid_info[i][1] == "EAP-TTLS":
|
|
ssid = ["ssid_idx=" + str(i) + " ssid=" + ssid_info[i][3] + " security=EAP-TTLS" +
|
|
" password=" + ssid_info[i][2] + " bssid=" + ssid_info[i][0]]
|
|
idx_mapping[str(i)] = [ssid_info[i][3], ssid_info[i][2], ssid_info[i][1], band_mapping[ssid_info[i][0]],
|
|
ssid_info[i][0]]
|
|
ssid_data.append(ssid)
|
|
lf_tools.dut_idx_mapping = idx_mapping
|
|
# Add bssid password and security from iwinfo data
|
|
# Format SSID Data in the below format
|
|
# ssid_data = [
|
|
# ['ssid_idx=0 ssid=Default-SSID-2g security=WPA|WEP| password=12345678 bssid=90:3c:b3:94:48:58'],
|
|
# ['ssid_idx=1 ssid=Default-SSID-5gl password=12345678 bssid=90:3c:b3:94:48:59']
|
|
# ]
|
|
allure.attach(name="SSID DATA IN LF DUT", body=str(ssid_data))
|
|
lf_tools.update_ssid(ssid_data=ssid_data)
|
|
|
|
def teardown_session():
|
|
print("\nRemoving Profiles")
|
|
instantiate_profile.delete_profile_by_name(profile_name=profile_data['equipment_ap']['profile_name'])
|
|
instantiate_profile.delete_profile(instantiate_profile.profile_creation_ids["ssid"])
|
|
instantiate_profile.delete_profile(instantiate_profile.profile_creation_ids["radius"])
|
|
instantiate_profile.delete_profile(instantiate_profile.profile_creation_ids["rf"])
|
|
allure.attach(body=str(profile_data['equipment_ap']['profile_name'] + "\n"),
|
|
name="Tear Down in Profiles ")
|
|
time.sleep(20)
|
|
|
|
request.addfinalizer(teardown_session)
|
|
yield test_cases
|
|
else:
|
|
instantiate_profile_obj = instantiate_profile(sdk_client=setup_controller)
|
|
print(1, instantiate_profile_obj.sdk_client)
|
|
vlan_id, mode = 0, 0
|
|
parameter = dict(request.param)
|
|
print(parameter)
|
|
test_cases = {}
|
|
profile_data = {}
|
|
if parameter['mode'] not in ["BRIDGE", "NAT", "VLAN"]:
|
|
print("Invalid Mode: ", parameter['mode'])
|
|
allure.attach(body=parameter['mode'], name="Invalid Mode: ")
|
|
yield test_cases
|
|
instantiate_profile_obj.set_radio_config()
|
|
if parameter['mode'] == "NAT":
|
|
mode = "NAT"
|
|
instantiate_profile_obj.set_mode(mode=mode)
|
|
vlan_id = 1
|
|
if parameter['mode'] == "BRIDGE":
|
|
mode = "BRIDGE"
|
|
instantiate_profile_obj.set_mode(mode=mode)
|
|
vlan_id = 1
|
|
if parameter['mode'] == "VLAN":
|
|
mode = "VLAN"
|
|
instantiate_profile_obj.set_mode(mode=mode)
|
|
vlan_id = setup_vlan
|
|
profile_data["ssid"] = {}
|
|
for i in parameter["ssid_modes"]:
|
|
profile_data["ssid"][i] = []
|
|
for j in range(len(parameter["ssid_modes"][i])):
|
|
data = parameter["ssid_modes"][i][j]
|
|
profile_data["ssid"][i].append(data)
|
|
lf_dut_data = []
|
|
for mode in profile_data['ssid']:
|
|
if mode == "open":
|
|
for j in profile_data["ssid"][mode]:
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
j["appliedRadios"] = list(set(j["appliedRadios"]))
|
|
j['security'] = 'none'
|
|
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
|
|
test_cases["wpa_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
if mode == "wpa":
|
|
for j in profile_data["ssid"][mode]:
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
j["appliedRadios"] = list(set(j["appliedRadios"]))
|
|
j['security'] = 'psk'
|
|
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
|
|
test_cases["wpa_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa_2g"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
if mode == "wpa2_personal":
|
|
for j in profile_data["ssid"][mode]:
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
j["appliedRadios"] = list(set(j["appliedRadios"]))
|
|
j['security'] = 'psk2'
|
|
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
|
|
test_cases["wpa_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa2_personal"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
if mode == "wpa_wpa2_personal_mixed":
|
|
for j in profile_data["ssid"][mode]:
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
j["appliedRadios"] = list(set(j["appliedRadios"]))
|
|
j['security'] = 'psk-mixed'
|
|
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
|
|
test_cases["wpa_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa2_personal"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
if mode == "wpa3_personal":
|
|
for j in profile_data["ssid"][mode]:
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
j["appliedRadios"] = list(set(j["appliedRadios"]))
|
|
j['security'] = 'sae'
|
|
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
|
|
test_cases["wpa_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa2_personal"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
if mode == "wpa3_personal_mixed":
|
|
for j in profile_data["ssid"][mode]:
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
j["appliedRadios"] = list(set(j["appliedRadios"]))
|
|
j['security'] = 'sae-mixed'
|
|
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j)
|
|
test_cases["wpa_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa2_personal"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
|
|
# EAP SSID Modes
|
|
if mode == "wpa2_enterprise":
|
|
for j in profile_data["ssid"][mode]:
|
|
if mode in get_markers.keys() and get_markers[mode]:
|
|
try:
|
|
if j["appliedRadios"].__contains__("2G"):
|
|
lf_dut_data.append(j)
|
|
if j["appliedRadios"].__contains__("5G"):
|
|
lf_dut_data.append(j)
|
|
j["appliedRadios"] = list(set(j["appliedRadios"]))
|
|
j['security'] = 'wpa2'
|
|
RADIUS_SERVER_DATA = radius_info
|
|
RADIUS_ACCOUNTING_DATA = radius_accounting_info
|
|
creates_profile = instantiate_profile_obj.add_ssid(ssid_data=j, radius=True,
|
|
radius_auth_data=RADIUS_SERVER_DATA,
|
|
radius_accounting_data=RADIUS_ACCOUNTING_DATA)
|
|
test_cases["wpa_2g"] = True
|
|
allure.attach(body=str(creates_profile),
|
|
name="SSID Profile Created")
|
|
except Exception as e:
|
|
print(e)
|
|
test_cases["wpa2_personal"] = False
|
|
allure.attach(body=str(e),
|
|
name="SSID Profile Creation Failed")
|
|
ap_ssh = get_apnos(get_configuration['access_point'][0], pwd="../libs/apnos/", sdk="2.x")
|
|
connected, latest, active = ap_ssh.get_ucentral_status()
|
|
print(2, instantiate_profile_obj.sdk_client)
|
|
if connected == False:
|
|
pytest.exit("AP is disconnected")
|
|
instantiate_profile_obj.push_config(serial_number=get_equipment_id[0])
|
|
config = json.loads(str(instantiate_profile_obj.base_profile_config).replace(" ", "").replace("'", '"'))
|
|
config["uuid"] = 0
|
|
ap_config_latest = ap_ssh.get_uc_latest_config()
|
|
try:
|
|
ap_config_latest["uuid"] = 0
|
|
except Exception as e:
|
|
print(e)
|
|
pass
|
|
x = 1
|
|
while ap_config_latest != config:
|
|
time.sleep(5)
|
|
x += 1
|
|
ap_config_latest = ap_ssh.get_uc_latest_config()
|
|
ap_config_latest["uuid"] = 0
|
|
if x == 19:
|
|
break
|
|
if x < 19:
|
|
print("Config properly applied into AP", config)
|
|
ap_config_latest = ap_ssh.get_uc_latest_config()
|
|
ap_config_latest["uuid"] = 0
|
|
|
|
ap_config_active = ap_ssh.get_uc_active_config()
|
|
ap_config_active["uuid"] = 0
|
|
x = 1
|
|
while ap_config_active != ap_config_latest:
|
|
time.sleep(5)
|
|
x += 1
|
|
ap_config_latest = ap_ssh.get_uc_latest_config()
|
|
print(ap_config_latest)
|
|
ap_config_latest["uuid"] = 0
|
|
|
|
ap_config_active = ap_ssh.get_uc_active_config()
|
|
print(ap_config_active)
|
|
ap_config_active["uuid"] = 0
|
|
if x == 19:
|
|
break
|
|
allure_body = "AP config status: \n" + \
|
|
"Active Config: " + str(ap_ssh.get_uc_active_config()) + "\n" \
|
|
"Latest Config: ", str(
|
|
ap_ssh.get_uc_latest_config()) + "\n" \
|
|
"Applied Config: ", str(config)
|
|
if x < 19:
|
|
print("AP is Broadcasting Applied Config")
|
|
allure.attach(name="Config Info", body="AP is Broadcasting Applied Config: " + str(allure_body))
|
|
else:
|
|
print("AP is Not Broadcasting Applied Config")
|
|
allure.attach(name="Config Info", body="AP is Not Broadcasting Applied Config: " + str(allure_body))
|
|
ap_logs = ap_ssh.logread()
|
|
allure.attach(body=ap_logs, name="AP LOgs: ")
|
|
ap_wifi_data = ap_ssh.get_interface_details()
|
|
idx_mapping = {}
|
|
ssid_data = []
|
|
ap_interfaces = list(ap_wifi_data.keys())
|
|
for interface in range(len(ap_interfaces)):
|
|
if ap_wifi_data[ap_interfaces[interface]][1] == "none":
|
|
ssid = ["ssid_idx=" + str(interface) +
|
|
" ssid=" + ap_wifi_data[ap_interfaces[interface]][0] +
|
|
" security=OPEN" +
|
|
" password=" + ap_wifi_data[ap_interfaces[interface]][2] +
|
|
" bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
idx_mapping[str(i)] = [ap_wifi_data[ap_interfaces[interface]][0],
|
|
ap_wifi_data[ap_interfaces[interface]][2],
|
|
ap_wifi_data[ap_interfaces[interface]][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
# pass
|
|
if ap_wifi_data[ap_interfaces[interface]][1] == "psk":
|
|
ssid = ["ssid_idx=" + str(interface) +
|
|
" ssid=" + ap_wifi_data[ap_interfaces[interface]][0] +
|
|
" security=WPA" +
|
|
" password=" + ap_wifi_data[ap_interfaces[interface]][2] +
|
|
" bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
idx_mapping[str(i)] = [ap_wifi_data[ap_interfaces[interface]][0],
|
|
ap_wifi_data[ap_interfaces[interface]][2],
|
|
ap_wifi_data[ap_interfaces[interface]][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
# pass
|
|
if ap_wifi_data[ap_interfaces[interface]][1] == "psk-mixed":
|
|
ssid = ["ssid_idx=" + str(interface) +
|
|
" ssid=" + ap_wifi_data[ap_interfaces[interface]][0] +
|
|
" security=WPA|WPA2" +
|
|
" password=" + ap_wifi_data[ap_interfaces[interface]][2] +
|
|
" bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
idx_mapping[str(i)] = [ap_wifi_data[ap_interfaces[interface]][0],
|
|
ap_wifi_data[ap_interfaces[interface]][2],
|
|
ap_wifi_data[ap_interfaces[interface]][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
# pass
|
|
if ap_wifi_data[ap_interfaces[interface]][1] == "psk2":
|
|
ssid = ["ssid_idx=" + str(interface) +
|
|
" ssid=" + ap_wifi_data[ap_interfaces[interface]][0] +
|
|
" security=WPA2" +
|
|
" password=" + ap_wifi_data[ap_interfaces[interface]][2] +
|
|
" bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
idx_mapping[str(i)] = [ap_wifi_data[ap_interfaces[interface]][0],
|
|
ap_wifi_data[ap_interfaces[interface]][2],
|
|
ap_wifi_data[ap_interfaces[interface]][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
# pass
|
|
if ap_wifi_data[ap_interfaces[interface]][1] == "sae":
|
|
ssid = ["ssid_idx=" + str(interface) +
|
|
" ssid=" + ap_wifi_data[ap_interfaces[interface]][0] +
|
|
" security=WPA3" +
|
|
" password=" + ap_wifi_data[ap_interfaces[interface]][2] +
|
|
" bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
idx_mapping[str(i)] = [ap_wifi_data[ap_interfaces[interface]][0],
|
|
ap_wifi_data[ap_interfaces[interface]][2],
|
|
ap_wifi_data[ap_interfaces[interface]][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
# pass
|
|
if ap_wifi_data[ap_interfaces[interface]][1] == "sae-mixed":
|
|
ssid = ["ssid_idx=" + str(interface) +
|
|
" ssid=" + ap_wifi_data[ap_interfaces[interface]][0] +
|
|
" security=WPA3" +
|
|
" password=" + ap_wifi_data[ap_interfaces[interface]][2] +
|
|
" bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
idx_mapping[str(i)] = [ap_wifi_data[ap_interfaces[interface]][0],
|
|
ap_wifi_data[ap_interfaces[interface]][2],
|
|
ap_wifi_data[ap_interfaces[interface]][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
# pass
|
|
else:
|
|
ssid = ["ssid_idx=" + str(interface) +
|
|
" ssid=" + ap_wifi_data[ap_interfaces[interface]][0] +
|
|
" security=EAP-TTLS" +
|
|
" password=" + ap_wifi_data[ap_interfaces[interface]][2] +
|
|
" bssid=" + ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
idx_mapping[str(i)] = [ap_wifi_data[ap_interfaces[interface]][0],
|
|
ap_wifi_data[ap_interfaces[interface]][2],
|
|
ap_wifi_data[ap_interfaces[interface]][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][1],
|
|
ap_wifi_data[ap_interfaces[interface]][3][0]
|
|
]
|
|
# pass
|
|
ssid_data.append(ssid)
|
|
lf_tools.ssid_list.append(ap_wifi_data[ap_interfaces[interface]][0])
|
|
lf_tools.dut_idx_mapping = idx_mapping
|
|
yield test_cases
|
|
|
|
|
|
@pytest.fixture(scope="session")
|
|
def lf_test(get_configuration, setup_influx):
|
|
# print(get_configuration)
|
|
obj = RunTest(lanforge_data=get_configuration['traffic_generator']['details'], influx_params=setup_influx)
|
|
# pytest.exit("")
|
|
yield obj
|
|
|
|
|
|
@pytest.fixture(scope="session")
|
|
def station_names_twog(request, get_configuration):
|
|
station_names = []
|
|
for i in range(0, int(request.config.getini("num_stations"))):
|
|
station_names.append(get_configuration["traffic_generator"]["details"]["2.4G-Station-Name"] + "0" + str(i))
|
|
yield station_names
|
|
|
|
|
|
@pytest.fixture(scope="session")
|
|
def station_names_fiveg(request, get_configuration):
|
|
station_names = []
|
|
for i in range(0, int(request.config.getini("num_stations"))):
|
|
station_names.append(get_configuration["traffic_generator"]["details"]["5G-Station-Name"] + "0" + str(i))
|
|
yield station_names
|
|
|
|
|
|
@pytest.fixture(scope="session")
|
|
def num_stations(request):
|
|
num_sta = int(request.config.getini("num_stations"))
|
|
yield num_sta
|
|
|
|
|
|
@pytest.fixture(scope="class")
|
|
def get_vif_state(get_apnos, get_configuration, request, lf_tools):
|
|
if request.config.getoption("1.x"):
|
|
ap_ssh = get_apnos(get_configuration['access_point'][0], pwd="../libs/apnos/")
|
|
vif_state = list(ap_ssh.get_vif_state_ssids())
|
|
vif_state.sort()
|
|
allure.attach(name="vif_state", body=str(vif_state))
|
|
yield vif_state
|
|
else:
|
|
yield lf_tools.ssid_list
|
|
|
|
|
|
@pytest.fixture(scope="class")
|
|
def get_vlan_list(get_apnos, get_configuration):
|
|
ap_ssh = get_apnos(get_configuration['access_point'][0], pwd="../libs/apnos/")
|
|
vlan_list = list(ap_ssh.get_vlan())
|
|
vlan_list.sort()
|
|
allure.attach(name="vlan_list", body=str(vlan_list))
|
|
yield vlan_list
|