|
@@ -111,7 +111,7 @@ def test_backup_client_authorized_keys(host):
|
|
|
assert client1_user_authorized_keys.user == 'root'
|
|
|
assert client1_user_authorized_keys.group == 'bak-client1_backup'
|
|
|
assert client1_user_authorized_keys.mode == 0o640
|
|
|
assert client1_user_authorized_keys.content == open('tests/data/ssh/client1.pub', 'r').read()
|
|
|
assert client1_user_authorized_keys.content_string == open('tests/data/ssh/client1.pub', 'r').read()
|
|
|
|
|
|
client2_user = host.user('bak-client2-backup')
|
|
|
|
|
@@ -120,7 +120,7 @@ def test_backup_client_authorized_keys(host):
|
|
|
assert client2_user_authorized_keys.user == 'root'
|
|
|
assert client2_user_authorized_keys.group == 'bak-client2-backup'
|
|
|
assert client2_user_authorized_keys.mode == 0o640
|
|
|
assert client2_user_authorized_keys.content == open('tests/data/ssh/client2.pub', 'r').read()
|
|
|
assert client2_user_authorized_keys.content_string == open('tests/data/ssh/client2.pub', 'r').read()
|
|
|
|
|
|
|
|
|
def test_firewall_configuration(host):
|
|
@@ -136,7 +136,7 @@ def test_firewall_configuration(host):
|
|
|
assert firewall_config.user == 'root'
|
|
|
assert firewall_config.group == 'root'
|
|
|
assert firewall_config.mode == 0o640
|
|
|
assert 'saddr ( 10.31.127.1 10.31.127.3) @subchain "backup_in" {' in firewall_config.content
|
|
|
assert 'saddr ( 10.31.127.1 10.31.127.3) @subchain "backup_in" {' in firewall_config.content_string
|
|
|
|
|
|
|
|
|
@pytest.mark.usefixtures("prepare_ssh_client_private_key_permissions")
|