CI: balance groups (#548)
* Show timings with devel, and skip everything else.
* Move to other group.
* Try smaller SSH key size (i.e. make tests run faster).
* Add implicit size that now must be explicit.
* Change group of luks_device.
* Revert "Show timings with devel, and skip everything else."
This reverts commit 7b73f7e4d7
.
pull/551/head
parent
242c15bf4c
commit
5ddfb2c2ca
|
@ -2,5 +2,5 @@
|
|||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||
|
||||
azp/generic/1
|
||||
azp/posix/1
|
||||
azp/generic/2
|
||||
azp/posix/2
|
||||
|
|
|
@ -3,6 +3,6 @@
|
|||
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||
|
||||
context/controller
|
||||
azp/generic/1
|
||||
azp/posix/1
|
||||
azp/generic/2
|
||||
azp/posix/2
|
||||
destructive
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||
|
||||
azp/posix/1
|
||||
azp/posix/2
|
||||
skip/osx
|
||||
skip/macos
|
||||
skip/freebsd
|
||||
|
|
|
@ -2,5 +2,5 @@
|
|||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||
|
||||
azp/posix/1
|
||||
azp/posix/2
|
||||
destructive
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
openssh_keypair:
|
||||
path: "{{ signing_key }}"
|
||||
type: rsa
|
||||
size: 2048
|
||||
size: 1024
|
||||
|
||||
- block:
|
||||
- name: Import idempotency tests
|
||||
|
|
|
@ -2,5 +2,5 @@
|
|||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||
|
||||
azp/posix/1
|
||||
azp/posix/2
|
||||
destructive
|
||||
|
|
|
@ -11,7 +11,7 @@
|
|||
- name: "({{ backend }}) Generate key (check mode)"
|
||||
openssh_keypair:
|
||||
path: "{{ remote_tmp_dir }}/core"
|
||||
size: 2048
|
||||
size: 1280
|
||||
backend: "{{ backend }}"
|
||||
register: check_core_output
|
||||
check_mode: true
|
||||
|
@ -19,14 +19,14 @@
|
|||
- name: "({{ backend }}) Generate key"
|
||||
openssh_keypair:
|
||||
path: "{{ remote_tmp_dir }}/core"
|
||||
size: 2048
|
||||
size: 1280
|
||||
backend: "{{ backend }}"
|
||||
register: core_output
|
||||
|
||||
- name: "({{ backend }}) Generate key (check mode idempotent)"
|
||||
openssh_keypair:
|
||||
path: "{{ remote_tmp_dir }}/core"
|
||||
size: 2048
|
||||
size: 1280
|
||||
backend: "{{ backend }}"
|
||||
register: idempotency_check_core_output
|
||||
check_mode: true
|
||||
|
@ -34,7 +34,7 @@
|
|||
- name: "({{ backend }}) Generate key (idempotent)"
|
||||
openssh_keypair:
|
||||
path: '{{ remote_tmp_dir }}/core'
|
||||
size: 2048
|
||||
size: 1280
|
||||
backend: "{{ backend }}"
|
||||
register: idempotency_core_output
|
||||
|
||||
|
@ -69,7 +69,7 @@
|
|||
assert:
|
||||
that:
|
||||
- core_output['size']|type_debug == 'int'
|
||||
- core_output['size'] == 2048
|
||||
- core_output['size'] == 1280
|
||||
|
||||
- name: "({{ backend }}) Assert key returns key type"
|
||||
assert:
|
||||
|
@ -84,7 +84,7 @@
|
|||
- name: "({{ backend }}) Assert key size matches 'ssh-keygen' output"
|
||||
assert:
|
||||
that:
|
||||
- core_size_ssh_keygen.stdout == '2048'
|
||||
- core_size_ssh_keygen.stdout == '1280'
|
||||
|
||||
- name: "({{ backend }}) Read core.pub"
|
||||
slurp:
|
||||
|
|
|
@ -47,7 +47,7 @@
|
|||
- name: Modify unprotected key with passphrase
|
||||
openssh_keypair:
|
||||
path: '{{ remote_tmp_dir }}/unprotected'
|
||||
size: 2048
|
||||
size: 1280
|
||||
passphrase: "{{ passphrase }}"
|
||||
backend: cryptography
|
||||
ignore_errors: true
|
||||
|
@ -56,7 +56,7 @@
|
|||
- name: Modify unprotected key with passphrase (force)
|
||||
openssh_keypair:
|
||||
path: '{{ remote_tmp_dir }}/unprotected'
|
||||
size: 2048
|
||||
size: 1280
|
||||
passphrase: "{{ passphrase }}"
|
||||
force: true
|
||||
backend: cryptography
|
||||
|
@ -75,13 +75,14 @@
|
|||
state: absent
|
||||
|
||||
- name: Generate PEM encoded key with passphrase
|
||||
command: 'ssh-keygen -b 4096 -f {{ remote_tmp_dir }}/pem_encoded -N {{ passphrase }} -m PEM'
|
||||
command: 'ssh-keygen -b 1280 -f {{ remote_tmp_dir }}/pem_encoded -N {{ passphrase }} -m PEM'
|
||||
|
||||
- name: Try to verify a PEM encoded key
|
||||
openssh_keypair:
|
||||
path: '{{ remote_tmp_dir }}/pem_encoded'
|
||||
passphrase: "{{ passphrase }}"
|
||||
backend: cryptography
|
||||
size: 1280
|
||||
register: pem_encoded_output
|
||||
|
||||
- name: Check that PEM encoded file is read without errors
|
||||
|
|
|
@ -104,7 +104,7 @@
|
|||
- name: "({{ backend }}) Modify key - password_protected"
|
||||
openssh_keypair:
|
||||
path: "{{ remote_tmp_dir }}/password_protected"
|
||||
size: 2048
|
||||
size: 1280
|
||||
backend: "{{ backend }}"
|
||||
register: password_protected_output
|
||||
ignore_errors: true
|
||||
|
@ -118,7 +118,7 @@
|
|||
- name: "({{ backend }}) Modify key with 'force=true' - password_protected"
|
||||
openssh_keypair:
|
||||
path: "{{ remote_tmp_dir }}/password_protected"
|
||||
size: 2048
|
||||
size: 1280
|
||||
backend: "{{ backend }}"
|
||||
force: true
|
||||
register: force_password_protected_output
|
||||
|
|
|
@ -2,6 +2,6 @@
|
|||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||
|
||||
azp/generic/1
|
||||
azp/posix/1
|
||||
azp/generic/2
|
||||
azp/posix/2
|
||||
destructive
|
||||
|
|
Loading…
Reference in New Issue