diff --git a/tests/integration/targets/certificate_complete_chain/aliases b/tests/integration/targets/certificate_complete_chain/aliases index af144115..85778914 100644 --- a/tests/integration/targets/certificate_complete_chain/aliases +++ b/tests/integration/targets/certificate_complete_chain/aliases @@ -2,5 +2,5 @@ # GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt) # SPDX-License-Identifier: GPL-3.0-or-later -azp/generic/1 -azp/posix/1 +azp/generic/2 +azp/posix/2 diff --git a/tests/integration/targets/crypto_info/aliases b/tests/integration/targets/crypto_info/aliases index 768a4b6e..00bbb3dd 100644 --- a/tests/integration/targets/crypto_info/aliases +++ b/tests/integration/targets/crypto_info/aliases @@ -3,6 +3,6 @@ # SPDX-License-Identifier: GPL-3.0-or-later context/controller -azp/generic/1 -azp/posix/1 +azp/generic/2 +azp/posix/2 destructive diff --git a/tests/integration/targets/luks_device/aliases b/tests/integration/targets/luks_device/aliases index 5fedfbfb..187550ee 100644 --- a/tests/integration/targets/luks_device/aliases +++ b/tests/integration/targets/luks_device/aliases @@ -2,7 +2,7 @@ # GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt) # SPDX-License-Identifier: GPL-3.0-or-later -azp/posix/1 +azp/posix/2 skip/osx skip/macos skip/freebsd diff --git a/tests/integration/targets/openssh_cert/aliases b/tests/integration/targets/openssh_cert/aliases index 428e8289..326a499c 100644 --- a/tests/integration/targets/openssh_cert/aliases +++ b/tests/integration/targets/openssh_cert/aliases @@ -2,5 +2,5 @@ # GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt) # SPDX-License-Identifier: GPL-3.0-or-later -azp/posix/1 +azp/posix/2 destructive diff --git a/tests/integration/targets/openssh_cert/tasks/main.yml b/tests/integration/targets/openssh_cert/tasks/main.yml index 3d1c3aa7..94782c95 100644 --- a/tests/integration/targets/openssh_cert/tasks/main.yml +++ b/tests/integration/targets/openssh_cert/tasks/main.yml @@ -18,7 +18,7 @@ openssh_keypair: path: "{{ signing_key }}" type: rsa - size: 2048 + size: 1024 - block: - name: Import idempotency tests diff --git a/tests/integration/targets/openssh_keypair/aliases b/tests/integration/targets/openssh_keypair/aliases index 428e8289..326a499c 100644 --- a/tests/integration/targets/openssh_keypair/aliases +++ b/tests/integration/targets/openssh_keypair/aliases @@ -2,5 +2,5 @@ # GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt) # SPDX-License-Identifier: GPL-3.0-or-later -azp/posix/1 +azp/posix/2 destructive diff --git a/tests/integration/targets/openssh_keypair/tests/core.yml b/tests/integration/targets/openssh_keypair/tests/core.yml index 2ca946be..a0182b48 100644 --- a/tests/integration/targets/openssh_keypair/tests/core.yml +++ b/tests/integration/targets/openssh_keypair/tests/core.yml @@ -11,7 +11,7 @@ - name: "({{ backend }}) Generate key (check mode)" openssh_keypair: path: "{{ remote_tmp_dir }}/core" - size: 2048 + size: 1280 backend: "{{ backend }}" register: check_core_output check_mode: true @@ -19,14 +19,14 @@ - name: "({{ backend }}) Generate key" openssh_keypair: path: "{{ remote_tmp_dir }}/core" - size: 2048 + size: 1280 backend: "{{ backend }}" register: core_output - name: "({{ backend }}) Generate key (check mode idempotent)" openssh_keypair: path: "{{ remote_tmp_dir }}/core" - size: 2048 + size: 1280 backend: "{{ backend }}" register: idempotency_check_core_output check_mode: true @@ -34,7 +34,7 @@ - name: "({{ backend }}) Generate key (idempotent)" openssh_keypair: path: '{{ remote_tmp_dir }}/core' - size: 2048 + size: 1280 backend: "{{ backend }}" register: idempotency_core_output @@ -69,7 +69,7 @@ assert: that: - core_output['size']|type_debug == 'int' - - core_output['size'] == 2048 + - core_output['size'] == 1280 - name: "({{ backend }}) Assert key returns key type" assert: @@ -84,7 +84,7 @@ - name: "({{ backend }}) Assert key size matches 'ssh-keygen' output" assert: that: - - core_size_ssh_keygen.stdout == '2048' + - core_size_ssh_keygen.stdout == '1280' - name: "({{ backend }}) Read core.pub" slurp: diff --git a/tests/integration/targets/openssh_keypair/tests/cryptography_backend.yml b/tests/integration/targets/openssh_keypair/tests/cryptography_backend.yml index 3339ffe7..b72c0be6 100644 --- a/tests/integration/targets/openssh_keypair/tests/cryptography_backend.yml +++ b/tests/integration/targets/openssh_keypair/tests/cryptography_backend.yml @@ -47,7 +47,7 @@ - name: Modify unprotected key with passphrase openssh_keypair: path: '{{ remote_tmp_dir }}/unprotected' - size: 2048 + size: 1280 passphrase: "{{ passphrase }}" backend: cryptography ignore_errors: true @@ -56,7 +56,7 @@ - name: Modify unprotected key with passphrase (force) openssh_keypair: path: '{{ remote_tmp_dir }}/unprotected' - size: 2048 + size: 1280 passphrase: "{{ passphrase }}" force: true backend: cryptography @@ -75,13 +75,14 @@ state: absent - name: Generate PEM encoded key with passphrase - command: 'ssh-keygen -b 4096 -f {{ remote_tmp_dir }}/pem_encoded -N {{ passphrase }} -m PEM' + command: 'ssh-keygen -b 1280 -f {{ remote_tmp_dir }}/pem_encoded -N {{ passphrase }} -m PEM' - name: Try to verify a PEM encoded key openssh_keypair: path: '{{ remote_tmp_dir }}/pem_encoded' passphrase: "{{ passphrase }}" backend: cryptography + size: 1280 register: pem_encoded_output - name: Check that PEM encoded file is read without errors diff --git a/tests/integration/targets/openssh_keypair/tests/invalid.yml b/tests/integration/targets/openssh_keypair/tests/invalid.yml index f31949f9..35b749f7 100644 --- a/tests/integration/targets/openssh_keypair/tests/invalid.yml +++ b/tests/integration/targets/openssh_keypair/tests/invalid.yml @@ -104,7 +104,7 @@ - name: "({{ backend }}) Modify key - password_protected" openssh_keypair: path: "{{ remote_tmp_dir }}/password_protected" - size: 2048 + size: 1280 backend: "{{ backend }}" register: password_protected_output ignore_errors: true @@ -118,7 +118,7 @@ - name: "({{ backend }}) Modify key with 'force=true' - password_protected" openssh_keypair: path: "{{ remote_tmp_dir }}/password_protected" - size: 2048 + size: 1280 backend: "{{ backend }}" force: true register: force_password_protected_output diff --git a/tests/integration/targets/openssl_csr/aliases b/tests/integration/targets/openssl_csr/aliases index 3d7d391b..4602f118 100644 --- a/tests/integration/targets/openssl_csr/aliases +++ b/tests/integration/targets/openssl_csr/aliases @@ -2,6 +2,6 @@ # GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt) # SPDX-License-Identifier: GPL-3.0-or-later -azp/generic/1 -azp/posix/1 +azp/generic/2 +azp/posix/2 destructive