summaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authorJames Falcon <TheRealFalcon@users.noreply.github.com>2021-01-26 15:51:35 -0600
committerGitHub <noreply@github.com>2021-01-26 15:51:35 -0600
commite7e7b42900d83d540d69adf37962864b53dab602 (patch)
tree999f962923823d226b2bd7de32320acd8f5a9885 /tests
parent5ccc8cbadb6b30ecbfe6e448ed5f7f000f05c7f1 (diff)
downloadvyos-cloud-init-e7e7b42900d83d540d69adf37962864b53dab602.tar.gz
vyos-cloud-init-e7e7b42900d83d540d69adf37962864b53dab602.zip
Revert integration test associated with reverted #586 (#784)
Diffstat (limited to 'tests')
-rw-r--r--tests/integration_tests/assets/__init__.py16
-rwxr-xr-xtests/integration_tests/assets/test_id_rsa38
-rw-r--r--tests/integration_tests/assets/test_id_rsa.pub1
-rw-r--r--tests/integration_tests/bugs/test_gh586.py42
4 files changed, 0 insertions, 97 deletions
diff --git a/tests/integration_tests/assets/__init__.py b/tests/integration_tests/assets/__init__.py
deleted file mode 100644
index 0cf27982..00000000
--- a/tests/integration_tests/assets/__init__.py
+++ /dev/null
@@ -1,16 +0,0 @@
-import os
-from collections import namedtuple
-from pathlib import Path
-
-ASSET_DIR = Path(os.path.dirname(os.path.realpath(__file__)))
-PRIVATE_RSA_KEY_PATH = ASSET_DIR / 'test_id_rsa'
-PUBLIC_RSA_KEY_PATH = ASSET_DIR / 'test_id_rsa.pub'
-
-
-def get_test_rsa_keypair():
- with PUBLIC_RSA_KEY_PATH.open() as public_file:
- public_key = public_file.read()
- with PRIVATE_RSA_KEY_PATH.open() as private_file:
- private_key = private_file.read()
- KeyPair = namedtuple('KeyPair', 'public_rsa_key private_rsa_key')
- return KeyPair(public_key, private_key)
diff --git a/tests/integration_tests/assets/test_id_rsa b/tests/integration_tests/assets/test_id_rsa
deleted file mode 100755
index 1ef67135..00000000
--- a/tests/integration_tests/assets/test_id_rsa
+++ /dev/null
@@ -1,38 +0,0 @@
------BEGIN OPENSSH PRIVATE KEY-----
-b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn
-NhAAAAAwEAAQAAAYEAnY0A/9s891CKmS3CBVGgLjdEifgYf8y3Ht+TC3+ajvEIcEoxevgK
-t2mXoPw4P/5QrT4QmgG5N2Jr4Q5eNcgZ0zytoAlNxcM/R/soKi46hiLSArMNEiOlVi/vbf
-q3Du5XIiX8fZD+4xgq3+jQ3PMxzqBf3AU6RAC9Jj94pBHCbaKPSFfWU7fq/JIvukKIWckv
-UCkzNiaAWop3jNSEwFZbqKe2A1yesfgSpCmycggOVN/tMpFeVn8rzzG+LJ47TSoBav1P0F
-CegVKq5iyGhLdM4TnS3ajbSIf3+SSDMImyzzmXqPyG5zwcH8zuEI3aR9DTMmi49HnjVX0A
-N+61iQf8MEz9nnpUCnaeogiI4zfJQIMKHijGcFYR092BqJUmy50s239nFFBzCFRcmERdyh
-fxrrG5kpEPllPGO4AuCtR4aW9yVTqfDNO2dfX5xvF8ZakUCMdR7JomuzW097U8zHE6EOTI
-XVXatlI1cHt+KeugVrjzK2YNE1HEeGCt4l7qmpAXAAAFgL+LUj+/i1I/AAAAB3NzaC1yc2
-EAAAGBAJ2NAP/bPPdQipktwgVRoC43RIn4GH/Mtx7fkwt/mo7xCHBKMXr4Crdpl6D8OD/+
-UK0+EJoBuTdia+EOXjXIGdM8raAJTcXDP0f7KCouOoYi0gKzDRIjpVYv7236tw7uVyIl/H
-2Q/uMYKt/o0NzzMc6gX9wFOkQAvSY/eKQRwm2ij0hX1lO36vySL7pCiFnJL1ApMzYmgFqK
-d4zUhMBWW6intgNcnrH4EqQpsnIIDlTf7TKRXlZ/K88xviyeO00qAWr9T9BQnoFSquYsho
-S3TOE50t2o20iH9/kkgzCJss85l6j8huc8HB/M7hCN2kfQ0zJouPR541V9ADfutYkH/DBM
-/Z56VAp2nqIIiOM3yUCDCh4oxnBWEdPdgaiVJsudLNt/ZxRQcwhUXJhEXcoX8a6xuZKRD5
-ZTxjuALgrUeGlvclU6nwzTtnX1+cbxfGWpFAjHUeyaJrs1tPe1PMxxOhDkyF1V2rZSNXB7
-finroFa48ytmDRNRxHhgreJe6pqQFwAAAAMBAAEAAAGALgAgfZPGnjMu9ICOuLzXdwb+BQ
-aiKJZeFS6UIXRVbUzk+NxAzDWl811qPz/FMLIRXjPT5xN/v7MF6oUmbq+JEssRqrtssMRM
-MrkbRg2PWuDJzq32sAgmWx7N2p+sWTivyjGrIgJ22VmSEyRH72s2bK0YsAX6uCY7E/LOR6
-FD0nz3Ntkmo/T8MFiChPCuHQEHxnDxGett6IGrXDwksn/EbV7iXuLpFu9mifX+uxqtDI0B
-FZWqJLkm0m0kqKReji4oHIUJXw6yQrVYTy71WZ/VXzJ+B7w/WvFGJjAvZQSrwzElRfH8Th
-3knN6csSvC2sGCx5Dqi7fxpL4nZsYdGyB8siIxbvye4DUO8RXMjfJP9R+HMsBd4tSxjzLE
-lVNBrClJt2yt1JbuAwzsZpbk5jvJ2PqupqQX+WLrJ+i66nByUDCxtXuHG+e3FnATdcLtSv
-QvpuzSN3pfurK/C/J3kf6BTF9avK+bgw+MhbD3Ct4Lqi9s3VSgBQQCp7Hr67JEv4jZAAAA
-wGTnfuIb3F3p/NhEudAucWkXEbV9zsnIAtSoguSh7fPC21MGyfx6chsf4mXKHUNfuw8m5W
-2+tYa18af7Tp2nHWHPmWbY1z+g/DFCMCPaEbi1zffMlcTw7OZ8eV6D4isD30ul+eVguSYE
-Hw+ILgWQXVen0oFtM1FOHiIPtB8CWyaX6njyLRQU9dt3qcWBm/tocy4hTSfheeU21pupEw
-6/kfvqkq8J5MYTWF9yE1dNGEuoV2XpidX4ell/oH0qEPy4vQAAAMEAzZlbUVJ8OimOLivJ
-J0KYJD/QDPMk1bDsHi3MhBnWYEJ4t78L63aG2CAIy9DazueJH7S7h1N0Wbx5v0gSGA1gb2
-8YaEeUJDrrV7I1IbG9Gu4/Swfm4YAE+1mwK54CE5Nkefd+nz7jxLQSRUNO+AB3ldRpgqXV
-CGT+rkhF3wY9D4dpzRl9KQiVKIQLfqyUlO5PHWEGKh3gPRbHUv8GWSA463L3aSl26cnAmv
-CE++Ssusa9cIczTO7H+BsFc7MpWJKrAAAAwQDELFCX4ES/0HcVlTH3IjoRtIvPMb6lq545
-hPXwOb9ZpBmrgd5byZ0cEkjgEklNUZ9A9QIxrPNlVsB+z8QU+sV1qsExrPA9Fo8t9vFApi
-u6WFR5QbIl9A2fh+2wZR2i0ftsndGdy9zA4LBiBj4EzQYYG7PEzSHIvyGGc0iaG4YCP+D0
-ljbVv47DruKa3RYv8Feuevo2hhRBRLnwah8cqXyehprqwA96WOoRXZVPgz7LQHKKAVYKWY
-THmWZfry/xGEUAAAAKamFtZXNAbmV3dAE=
------END OPENSSH PRIVATE KEY-----
diff --git a/tests/integration_tests/assets/test_id_rsa.pub b/tests/integration_tests/assets/test_id_rsa.pub
deleted file mode 100644
index c14c3ea5..00000000
--- a/tests/integration_tests/assets/test_id_rsa.pub
+++ /dev/null
@@ -1 +0,0 @@
-ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCdjQD/2zz3UIqZLcIFUaAuN0SJ+Bh/zLce35MLf5qO8QhwSjF6+Aq3aZeg/Dg//lCtPhCaAbk3YmvhDl41yBnTPK2gCU3Fwz9H+ygqLjqGItICsw0SI6VWL+9t+rcO7lciJfx9kP7jGCrf6NDc8zHOoF/cBTpEAL0mP3ikEcJtoo9IV9ZTt+r8ki+6QohZyS9QKTM2JoBaineM1ITAVluop7YDXJ6x+BKkKbJyCA5U3+0ykV5WfyvPMb4snjtNKgFq/U/QUJ6BUqrmLIaEt0zhOdLdqNtIh/f5JIMwibLPOZeo/IbnPBwfzO4QjdpH0NMyaLj0eeNVfQA37rWJB/wwTP2eelQKdp6iCIjjN8lAgwoeKMZwVhHT3YGolSbLnSzbf2cUUHMIVFyYRF3KF/GusbmSkQ+WU8Y7gC4K1Hhpb3JVOp8M07Z19fnG8XxlqRQIx1Hsmia7NbT3tTzMcToQ5MhdVdq2UjVwe34p66BWuPMrZg0TUcR4YK3iXuqakBc= test@example
diff --git a/tests/integration_tests/bugs/test_gh586.py b/tests/integration_tests/bugs/test_gh586.py
deleted file mode 100644
index 44b643f1..00000000
--- a/tests/integration_tests/bugs/test_gh586.py
+++ /dev/null
@@ -1,42 +0,0 @@
-"""Integration test for pull #586
-
-If a non-default AuthorizedKeysFile is specified in /etc/ssh/sshd_config,
-ensure we can still ssh as expected.
-"""
-import paramiko
-import pytest
-from io import StringIO
-from tests.integration_tests.assets import get_test_rsa_keypair
-
-
-public_rsa_key, private_rsa_key = get_test_rsa_keypair()
-USER_DATA = """\
-#cloud-config
-bootcmd:
- - sed -i 's/#AuthorizedKeysFile.*/AuthorizedKeysFile\\ .ssh\\/authorized_keys2/' /etc/ssh/sshd_config
-ssh_authorized_keys:
- - {public_key}
-""".format(public_key=public_rsa_key) # noqa: E501
-
-
-@pytest.mark.sru_2020_11
-@pytest.mark.user_data(USER_DATA)
-def test_non_default_authorized_keys(client):
- sshd = client.read_from_file('/etc/ssh/sshd_config')
- assert 'AuthorizedKeysFile .ssh/authorized_keys2' in sshd
- assert sshd.count('AuthorizedKeysFile') == 1
-
- ssh_dir = client.execute('ls /home/ubuntu/.ssh').stdout
- assert 'authorized_keys2' in ssh_dir
-
- ssh = paramiko.SSHClient()
- ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
- paramiko_key = paramiko.RSAKey.from_private_key(StringIO(private_rsa_key))
-
- # Will fail with paramiko.ssh_exception.AuthenticationException
- # if this bug isn't fixed
- ssh.connect(
- client.instance.ip,
- username=client.instance.username,
- pkey=paramiko_key,
- )