diff --git a/roles/backup_server/molecule/default/tests/test_parameters_optional.py b/roles/backup_server/molecule/default/tests/test_parameters_optional.py index 9eeee279aa7521d64036f679c32f792be5a4825f..33cb10498ba21f0fba7e5413c0b7b2c25322ef0a 100644 --- a/roles/backup_server/molecule/default/tests/test_parameters_optional.py +++ b/roles/backup_server/molecule/default/tests/test_parameters_optional.py @@ -111,7 +111,7 @@ def test_backup_client_authorized_keys(host): assert client1_user_authorized_keys.user == 'root' assert client1_user_authorized_keys.group == 'bak-client1_backup' assert client1_user_authorized_keys.mode == 0o640 - assert client1_user_authorized_keys.content == open('tests/data/ssh/client1.pub', 'r').read() + assert client1_user_authorized_keys.content_string == open('tests/data/ssh/client1.pub', 'r').read() client2_user = host.user('bak-client2-backup') @@ -120,7 +120,7 @@ def test_backup_client_authorized_keys(host): assert client2_user_authorized_keys.user == 'root' assert client2_user_authorized_keys.group == 'bak-client2-backup' assert client2_user_authorized_keys.mode == 0o640 - assert client2_user_authorized_keys.content == open('tests/data/ssh/client2.pub', 'r').read() + assert client2_user_authorized_keys.content_string == open('tests/data/ssh/client2.pub', 'r').read() def test_firewall_configuration(host): @@ -136,7 +136,7 @@ def test_firewall_configuration(host): assert firewall_config.user == 'root' assert firewall_config.group == 'root' assert firewall_config.mode == 0o640 - assert 'saddr ( 10.31.127.1 10.31.127.3) @subchain "backup_in" {' in firewall_config.content + assert 'saddr ( 10.31.127.1 10.31.127.3) @subchain "backup_in" {' in firewall_config.content_string @pytest.mark.usefixtures("prepare_ssh_client_private_key_permissions")