diff options
author | Ćukasz 'sil2100' Zemczak <lukasz.zemczak@ubuntu.com> | 2017-03-15 10:19:34 +0100 |
---|---|---|
committer | usd-importer <ubuntu-server@lists.ubuntu.com> | 2017-03-17 13:08:24 +0000 |
commit | c6339c307f36f77a4198d6faf1275acdf371200b (patch) | |
tree | c774046e1e30617514c09e5a2b896568706a25a8 /tests/common/osutil/test_default.py | |
parent | dd73af563850762aad64e7ed2a9897377830af10 (diff) | |
parent | 2bc77af05fe602a2ba92569428c6006d1aebd19f (diff) | |
download | vyos-walinuxagent-c6339c307f36f77a4198d6faf1275acdf371200b.tar.gz vyos-walinuxagent-c6339c307f36f77a4198d6faf1275acdf371200b.zip |
Import patches-applied version 2.2.6-0ubuntu1 to applied/ubuntu/zesty-proposed
Imported using git-ubuntu import.
Changelog parent: dd73af563850762aad64e7ed2a9897377830af10
Unapplied parent: 2bc77af05fe602a2ba92569428c6006d1aebd19f
New changelog entries:
* New upstream release (LP: #1661750).
* debian/control:
- Change the maintainer to Ubuntu Developers (LP: #1657528).
- Add the dependency of isc-dhcp-client as our maintainer scripts assume
it's installed.
- Add trailing commas to dependencies, add whitespaces.
* Rename ephemeral-disk-warning.sh to ephemeral-disk-warning (lintian error).
* debian/docs:
- Remove LICENSE.txt as it's redundant.
* debian/postinst:
- Stop checking for update-initramfs existence using the absolute path, use
the 'command' command instead to make lintian happy.
* Remove debian/patches/disable-auto-update.patch:
- We now ship with auto-updates enabled (LP: #1650522).
* debian/maintscript:
- Add a maintscript to rename the old logrotate file on upgrade from an
ancient version of walinuxagent (LP: #1673152).
Diffstat (limited to 'tests/common/osutil/test_default.py')
-rw-r--r-- | tests/common/osutil/test_default.py | 151 |
1 files changed, 151 insertions, 0 deletions
diff --git a/tests/common/osutil/test_default.py b/tests/common/osutil/test_default.py index d982b7e..933787b 100644 --- a/tests/common/osutil/test_default.py +++ b/tests/common/osutil/test_default.py @@ -21,6 +21,7 @@ import mock import azurelinuxagent.common.osutil.default as osutil import azurelinuxagent.common.utils.shellutil as shellutil from azurelinuxagent.common.osutil import get_osutil +from azurelinuxagent.common.utils import fileutil from tests.tools import * @@ -164,5 +165,155 @@ class TestOSUtil(AgentTestCase): else: self.fail("Cannot retrieve number of process cores using shell command.") + def test_conf_sshd(self): + new_file = "\ +Port 22\n\ +Protocol 2\n\ +ChallengeResponseAuthentication yes\n\ +#PasswordAuthentication yes\n\ +UsePAM yes\n\ +" + expected_output = "\ +Port 22\n\ +Protocol 2\n\ +ChallengeResponseAuthentication no\n\ +#PasswordAuthentication yes\n\ +UsePAM yes\n\ +PasswordAuthentication no\n\ +ClientAliveInterval 180\n\ +" + + with patch.object(fileutil, 'write_file') as patch_write: + with patch.object(fileutil, 'read_file', return_value=new_file): + osutil.DefaultOSUtil().conf_sshd(disable_password=True) + patch_write.assert_called_once_with( + conf.get_sshd_conf_file_path(), + expected_output) + + def test_conf_sshd_with_match(self): + new_file = "\ +Port 22\n\ +ChallengeResponseAuthentication yes\n\ +Match host 192.168.1.1\n\ + ChallengeResponseAuthentication yes\n\ +" + expected_output = "\ +Port 22\n\ +ChallengeResponseAuthentication no\n\ +PasswordAuthentication no\n\ +ClientAliveInterval 180\n\ +Match host 192.168.1.1\n\ + ChallengeResponseAuthentication yes\n\ +" + + with patch.object(fileutil, 'write_file') as patch_write: + with patch.object(fileutil, 'read_file', return_value=new_file): + osutil.DefaultOSUtil().conf_sshd(disable_password=True) + patch_write.assert_called_once_with( + conf.get_sshd_conf_file_path(), + expected_output) + + def test_conf_sshd_with_match_last(self): + new_file = "\ +Port 22\n\ +Match host 192.168.1.1\n\ + ChallengeResponseAuthentication yes\n\ +" + expected_output = "\ +Port 22\n\ +PasswordAuthentication no\n\ +ChallengeResponseAuthentication no\n\ +ClientAliveInterval 180\n\ +Match host 192.168.1.1\n\ + ChallengeResponseAuthentication yes\n\ +" + + with patch.object(fileutil, 'write_file') as patch_write: + with patch.object(fileutil, 'read_file', return_value=new_file): + osutil.DefaultOSUtil().conf_sshd(disable_password=True) + patch_write.assert_called_once_with( + conf.get_sshd_conf_file_path(), + expected_output) + + def test_conf_sshd_with_match_middle(self): + new_file = "\ +Port 22\n\ +match host 192.168.1.1\n\ + ChallengeResponseAuthentication yes\n\ +match all\n\ +#Other config\n\ +" + expected_output = "\ +Port 22\n\ +match host 192.168.1.1\n\ + ChallengeResponseAuthentication yes\n\ +match all\n\ +#Other config\n\ +PasswordAuthentication no\n\ +ChallengeResponseAuthentication no\n\ +ClientAliveInterval 180\n\ +" + + with patch.object(fileutil, 'write_file') as patch_write: + with patch.object(fileutil, 'read_file', return_value=new_file): + osutil.DefaultOSUtil().conf_sshd(disable_password=True) + patch_write.assert_called_once_with( + conf.get_sshd_conf_file_path(), + expected_output) + + def test_conf_sshd_with_match_multiple(self): + new_file = "\ +Port 22\n\ +Match host 192.168.1.1\n\ + ChallengeResponseAuthentication yes\n\ +Match host 192.168.1.2\n\ + ChallengeResponseAuthentication yes\n\ +Match all\n\ +#Other config\n\ +" + expected_output = "\ +Port 22\n\ +Match host 192.168.1.1\n\ + ChallengeResponseAuthentication yes\n\ +Match host 192.168.1.2\n\ + ChallengeResponseAuthentication yes\n\ +Match all\n\ +#Other config\n\ +PasswordAuthentication no\n\ +ChallengeResponseAuthentication no\n\ +ClientAliveInterval 180\n\ +" + + with patch.object(fileutil, 'write_file') as patch_write: + with patch.object(fileutil, 'read_file', return_value=new_file): + osutil.DefaultOSUtil().conf_sshd(disable_password=True) + patch_write.assert_called_once_with( + conf.get_sshd_conf_file_path(), + expected_output) + + def test_conf_sshd_with_match_multiple_first_last(self): + new_file = "\ +Match host 192.168.1.1\n\ + ChallengeResponseAuthentication yes\n\ +Match host 192.168.1.2\n\ + ChallengeResponseAuthentication yes\n\ +" + expected_output = "\ +PasswordAuthentication no\n\ +ChallengeResponseAuthentication no\n\ +ClientAliveInterval 180\n\ +Match host 192.168.1.1\n\ + ChallengeResponseAuthentication yes\n\ +Match host 192.168.1.2\n\ + ChallengeResponseAuthentication yes\n\ +" + + with patch.object(fileutil, 'write_file') as patch_write: + with patch.object(fileutil, 'read_file', return_value=new_file): + osutil.DefaultOSUtil().conf_sshd(disable_password=True) + patch_write.assert_called_once_with( + conf.get_sshd_conf_file_path(), + expected_output) + if __name__ == '__main__': unittest.main() |