CI: balance groups (#548)
* Show timings with devel, and skip everything else.
* Move to other group.
* Try smaller SSH key size (i.e. make tests run faster).
* Add implicit size that now must be explicit.
* Change group of luks_device.
* Revert "Show timings with devel, and skip everything else."
This reverts commit 7b73f7e4d7
.
pull/551/head
parent
242c15bf4c
commit
5ddfb2c2ca
|
@ -2,5 +2,5 @@
|
||||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||||
|
|
||||||
azp/generic/1
|
azp/generic/2
|
||||||
azp/posix/1
|
azp/posix/2
|
||||||
|
|
|
@ -3,6 +3,6 @@
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||||
|
|
||||||
context/controller
|
context/controller
|
||||||
azp/generic/1
|
azp/generic/2
|
||||||
azp/posix/1
|
azp/posix/2
|
||||||
destructive
|
destructive
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||||
|
|
||||||
azp/posix/1
|
azp/posix/2
|
||||||
skip/osx
|
skip/osx
|
||||||
skip/macos
|
skip/macos
|
||||||
skip/freebsd
|
skip/freebsd
|
||||||
|
|
|
@ -2,5 +2,5 @@
|
||||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||||
|
|
||||||
azp/posix/1
|
azp/posix/2
|
||||||
destructive
|
destructive
|
||||||
|
|
|
@ -18,7 +18,7 @@
|
||||||
openssh_keypair:
|
openssh_keypair:
|
||||||
path: "{{ signing_key }}"
|
path: "{{ signing_key }}"
|
||||||
type: rsa
|
type: rsa
|
||||||
size: 2048
|
size: 1024
|
||||||
|
|
||||||
- block:
|
- block:
|
||||||
- name: Import idempotency tests
|
- name: Import idempotency tests
|
||||||
|
|
|
@ -2,5 +2,5 @@
|
||||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||||
|
|
||||||
azp/posix/1
|
azp/posix/2
|
||||||
destructive
|
destructive
|
||||||
|
|
|
@ -11,7 +11,7 @@
|
||||||
- name: "({{ backend }}) Generate key (check mode)"
|
- name: "({{ backend }}) Generate key (check mode)"
|
||||||
openssh_keypair:
|
openssh_keypair:
|
||||||
path: "{{ remote_tmp_dir }}/core"
|
path: "{{ remote_tmp_dir }}/core"
|
||||||
size: 2048
|
size: 1280
|
||||||
backend: "{{ backend }}"
|
backend: "{{ backend }}"
|
||||||
register: check_core_output
|
register: check_core_output
|
||||||
check_mode: true
|
check_mode: true
|
||||||
|
@ -19,14 +19,14 @@
|
||||||
- name: "({{ backend }}) Generate key"
|
- name: "({{ backend }}) Generate key"
|
||||||
openssh_keypair:
|
openssh_keypair:
|
||||||
path: "{{ remote_tmp_dir }}/core"
|
path: "{{ remote_tmp_dir }}/core"
|
||||||
size: 2048
|
size: 1280
|
||||||
backend: "{{ backend }}"
|
backend: "{{ backend }}"
|
||||||
register: core_output
|
register: core_output
|
||||||
|
|
||||||
- name: "({{ backend }}) Generate key (check mode idempotent)"
|
- name: "({{ backend }}) Generate key (check mode idempotent)"
|
||||||
openssh_keypair:
|
openssh_keypair:
|
||||||
path: "{{ remote_tmp_dir }}/core"
|
path: "{{ remote_tmp_dir }}/core"
|
||||||
size: 2048
|
size: 1280
|
||||||
backend: "{{ backend }}"
|
backend: "{{ backend }}"
|
||||||
register: idempotency_check_core_output
|
register: idempotency_check_core_output
|
||||||
check_mode: true
|
check_mode: true
|
||||||
|
@ -34,7 +34,7 @@
|
||||||
- name: "({{ backend }}) Generate key (idempotent)"
|
- name: "({{ backend }}) Generate key (idempotent)"
|
||||||
openssh_keypair:
|
openssh_keypair:
|
||||||
path: '{{ remote_tmp_dir }}/core'
|
path: '{{ remote_tmp_dir }}/core'
|
||||||
size: 2048
|
size: 1280
|
||||||
backend: "{{ backend }}"
|
backend: "{{ backend }}"
|
||||||
register: idempotency_core_output
|
register: idempotency_core_output
|
||||||
|
|
||||||
|
@ -69,7 +69,7 @@
|
||||||
assert:
|
assert:
|
||||||
that:
|
that:
|
||||||
- core_output['size']|type_debug == 'int'
|
- core_output['size']|type_debug == 'int'
|
||||||
- core_output['size'] == 2048
|
- core_output['size'] == 1280
|
||||||
|
|
||||||
- name: "({{ backend }}) Assert key returns key type"
|
- name: "({{ backend }}) Assert key returns key type"
|
||||||
assert:
|
assert:
|
||||||
|
@ -84,7 +84,7 @@
|
||||||
- name: "({{ backend }}) Assert key size matches 'ssh-keygen' output"
|
- name: "({{ backend }}) Assert key size matches 'ssh-keygen' output"
|
||||||
assert:
|
assert:
|
||||||
that:
|
that:
|
||||||
- core_size_ssh_keygen.stdout == '2048'
|
- core_size_ssh_keygen.stdout == '1280'
|
||||||
|
|
||||||
- name: "({{ backend }}) Read core.pub"
|
- name: "({{ backend }}) Read core.pub"
|
||||||
slurp:
|
slurp:
|
||||||
|
|
|
@ -47,7 +47,7 @@
|
||||||
- name: Modify unprotected key with passphrase
|
- name: Modify unprotected key with passphrase
|
||||||
openssh_keypair:
|
openssh_keypair:
|
||||||
path: '{{ remote_tmp_dir }}/unprotected'
|
path: '{{ remote_tmp_dir }}/unprotected'
|
||||||
size: 2048
|
size: 1280
|
||||||
passphrase: "{{ passphrase }}"
|
passphrase: "{{ passphrase }}"
|
||||||
backend: cryptography
|
backend: cryptography
|
||||||
ignore_errors: true
|
ignore_errors: true
|
||||||
|
@ -56,7 +56,7 @@
|
||||||
- name: Modify unprotected key with passphrase (force)
|
- name: Modify unprotected key with passphrase (force)
|
||||||
openssh_keypair:
|
openssh_keypair:
|
||||||
path: '{{ remote_tmp_dir }}/unprotected'
|
path: '{{ remote_tmp_dir }}/unprotected'
|
||||||
size: 2048
|
size: 1280
|
||||||
passphrase: "{{ passphrase }}"
|
passphrase: "{{ passphrase }}"
|
||||||
force: true
|
force: true
|
||||||
backend: cryptography
|
backend: cryptography
|
||||||
|
@ -75,13 +75,14 @@
|
||||||
state: absent
|
state: absent
|
||||||
|
|
||||||
- name: Generate PEM encoded key with passphrase
|
- name: Generate PEM encoded key with passphrase
|
||||||
command: 'ssh-keygen -b 4096 -f {{ remote_tmp_dir }}/pem_encoded -N {{ passphrase }} -m PEM'
|
command: 'ssh-keygen -b 1280 -f {{ remote_tmp_dir }}/pem_encoded -N {{ passphrase }} -m PEM'
|
||||||
|
|
||||||
- name: Try to verify a PEM encoded key
|
- name: Try to verify a PEM encoded key
|
||||||
openssh_keypair:
|
openssh_keypair:
|
||||||
path: '{{ remote_tmp_dir }}/pem_encoded'
|
path: '{{ remote_tmp_dir }}/pem_encoded'
|
||||||
passphrase: "{{ passphrase }}"
|
passphrase: "{{ passphrase }}"
|
||||||
backend: cryptography
|
backend: cryptography
|
||||||
|
size: 1280
|
||||||
register: pem_encoded_output
|
register: pem_encoded_output
|
||||||
|
|
||||||
- name: Check that PEM encoded file is read without errors
|
- name: Check that PEM encoded file is read without errors
|
||||||
|
|
|
@ -104,7 +104,7 @@
|
||||||
- name: "({{ backend }}) Modify key - password_protected"
|
- name: "({{ backend }}) Modify key - password_protected"
|
||||||
openssh_keypair:
|
openssh_keypair:
|
||||||
path: "{{ remote_tmp_dir }}/password_protected"
|
path: "{{ remote_tmp_dir }}/password_protected"
|
||||||
size: 2048
|
size: 1280
|
||||||
backend: "{{ backend }}"
|
backend: "{{ backend }}"
|
||||||
register: password_protected_output
|
register: password_protected_output
|
||||||
ignore_errors: true
|
ignore_errors: true
|
||||||
|
@ -118,7 +118,7 @@
|
||||||
- name: "({{ backend }}) Modify key with 'force=true' - password_protected"
|
- name: "({{ backend }}) Modify key with 'force=true' - password_protected"
|
||||||
openssh_keypair:
|
openssh_keypair:
|
||||||
path: "{{ remote_tmp_dir }}/password_protected"
|
path: "{{ remote_tmp_dir }}/password_protected"
|
||||||
size: 2048
|
size: 1280
|
||||||
backend: "{{ backend }}"
|
backend: "{{ backend }}"
|
||||||
force: true
|
force: true
|
||||||
register: force_password_protected_output
|
register: force_password_protected_output
|
||||||
|
|
|
@ -2,6 +2,6 @@
|
||||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||||
|
|
||||||
azp/generic/1
|
azp/generic/2
|
||||||
azp/posix/1
|
azp/posix/2
|
||||||
destructive
|
destructive
|
||||||
|
|
Loading…
Reference in New Issue