Behave Test Report

Features: failed: 1

Scenarios: skipped: 14, failed: 1

Steps: skipped: 197, passed: 35, failed: 1

Finished in 65.8 seconds

Feature: nmcli - procedures in documentation

features/scenarios/doc_procedures.feature:325 @rhelver+=8.6, @radius, @8021x_doc_procedure, @attach_wpa_supplicant_log, @permissive, @8021x_hostapd_freeradius_doc_procedure

Scenario: nmcli - docs - set up 802.1x using FreeRadius and hostapd

  1. Before scenario (2.178s)
    Status Before Scenario
    Memory use Before Scenario
    Commands
  2. * Add " bridge " connection named " br0 " for device " br0 " with options (0.045s)
    Commands
    con-name br0
    group-forward-mask 8 connection.autoconnect-slaves 1
    ipv4.method disabled ipv6.method disabled
  3. * Add " ethernet " connection named " br0-uplink " for device " eth4 " with options " master br0 " (0.042s)
    Commands
  4. * Execute " ip l add test1 type veth peer name test1b " (0.009s)
    Commands
  5. * Execute " ip l set dev test1b up " (0.005s)
    Commands
  6. * Execute " ip l set dev test1 up " (0.004s)
    Commands
  7. * Add " ethernet " connection named " br0-client-port " for device " test1b " with options " master br0 " (0.034s)
    Commands
  8. * Bring " up " connection " br0 " (0.061s)
    Commands
  9. * Execute " cp contrib/8021x/doc_procedures/hostapd.conf /etc/hostapd/hostapd.conf " (0.004s)
    Commands
  10. Then Execute " systemctl start hostapd " (0.020s)
    Commands
  11. * Execute " systemctl status hostapd " (0.013s)
    Commands
  12. * Execute " cp -f contrib/8021x/doc_procedures/wpa_supplicant-TTLS.conf /etc/wpa_supplicant/wpa_supplicant-TTLS.conf " (0.004s)
    Commands
  13. Then Note the output of " eapol_test -c /etc/wpa_supplicant/wpa_supplicant-TTLS.conf -s client_password " (0.017s)
  14. And Noted value contains " EAP: Status notification: remote certificate verification \(param=success\) " (0.000s)
  15. And Noted value contains " CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully " (0.001s)
  16. And Noted value contains " SUCCESS " (0.000s)
  17. * Run tcpdump labeled " wpas-ttls " with arguments " -i br0 ether proto 0x888e " (0.029s)
    Commands
  18. Then " CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully " is visible with command " wpa_supplicant -c /etc/wpa_supplicant/wpa_supplicant-TTLS.conf -D wired -i test1 -d -t " (32.051s)
    Commands
  19. * Stop tcpdump labeled " wpas-ttls " (0.008s)
    Commands
  20. * Run tcpdump labeled " nm-ttls " with arguments " -i br0 ether proto 0x888e " (0.027s)
    Commands
  21. * Add " ethernet " connection named " test1-ttls " for device " test1 " with options (0.033s)
    Commands
    autoconnect no 802-1x.eap ttls 802-1x.phase2-auth pap
    802-1x.identity example_user 802-1x.password user_password
    802-1x.ca-cert /etc/pki/tls/certs/8021x-ca.pem
  22. * Execute " sleep 1 " (1.003s)
    Commands
  23. When Bring up connection " test1-ttls " (4.613s)
    Commands
  24. Then Check if " test1-ttls " is active connection (0.027s)
    Commands
  25. * Disconnect device " test1 " (0.097s)
    Commands
  26. * Stop tcpdump labeled " nm-ttls " (0.008s)
    Commands
  27. * Execute " cp -f contrib/8021x/doc_procedures/wpa_supplicant-TLS.conf /etc/wpa_supplicant/wpa_supplicant-TLS.conf " (0.003s)
    Commands
  28. Then Note the output of " eapol_test -c /etc/wpa_supplicant/wpa_supplicant-TLS.conf -a 127.0.0.1 -s client_password " (0.019s)
  29. And Noted value contains " EAP: Status notification: remote certificate verification \(param=success\) " (0.000s)
  30. And Noted value contains " CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully " (0.000s)
  31. And Noted value contains " SUCCESS " (0.000s)
  32. * Run tcpdump labeled " wpas-tls " with arguments " -i br0 ether proto 0x888e " (0.023s)
    Commands
  33. Then " CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully " is visible with command " wpa_supplicant -c /etc/wpa_supplicant/wpa_supplicant-TLS.conf -D wired -i test1 -d -t " (2.025s)
    Commands
  34. * Stop tcpdump labeled " wpas-tls " (0.009s)
    Commands
  35. * Add " ethernet " connection named " test1-tls " for device " test1 " with options (0.039s)
    Commands
    autoconnect no 802-1x.eap tls 802-1x.identity spam
    802-1x.ca-cert /etc/pki/tls/certs/8021x-ca.pem 802-1x.client-cert /etc/pki/tls/certs/8021x.pem
    802-1x.private-key /etc/pki/tls/private/8021x.key 802-1x.private-key-password whatever
  36. * Run tcpdump labeled " nm-tls " with arguments " -i br0 ether proto 0x888e " (0.027s)
    Commands
  37. When Bring up connection " test1-tls " (25.535s)
    Error Message
    Commands
  38. After scenario (1.511s)
    Memory use After Scenario
    WPA_SUP
    HOSTAPD
    802.1X access control
    RADIUS
    Status After Scenario
    Commands
    NM
    Status After Clean
    Memory use After Clean
    tcpdump "nm-tls" decoded with tshark
    tcpdump "wpas-tls" decoded with tshark
    tcpdump "nm-ttls" decoded with tshark
    tcpdump "wpas-ttls" decoded with tshark