CI: balance groups (#548)

* Show timings with devel, and skip everything else.

* Move to other group.

* Try smaller SSH key size (i.e. make tests run faster).

* Add implicit size that now must be explicit.

* Change group of luks_device.

* Revert "Show timings with devel, and skip everything else."

This reverts commit 7b73f7e4d7.
pull/551/head
Felix Fontein 2022-12-21 08:12:53 +01:00 committed by GitHub
parent 242c15bf4c
commit 5ddfb2c2ca
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
10 changed files with 22 additions and 21 deletions

View File

@ -2,5 +2,5 @@
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
azp/generic/1
azp/posix/1
azp/generic/2
azp/posix/2

View File

@ -3,6 +3,6 @@
# SPDX-License-Identifier: GPL-3.0-or-later
context/controller
azp/generic/1
azp/posix/1
azp/generic/2
azp/posix/2
destructive

View File

@ -2,7 +2,7 @@
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
azp/posix/1
azp/posix/2
skip/osx
skip/macos
skip/freebsd

View File

@ -2,5 +2,5 @@
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
azp/posix/1
azp/posix/2
destructive

View File

@ -18,7 +18,7 @@
openssh_keypair:
path: "{{ signing_key }}"
type: rsa
size: 2048
size: 1024
- block:
- name: Import idempotency tests

View File

@ -2,5 +2,5 @@
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
azp/posix/1
azp/posix/2
destructive

View File

@ -11,7 +11,7 @@
- name: "({{ backend }}) Generate key (check mode)"
openssh_keypair:
path: "{{ remote_tmp_dir }}/core"
size: 2048
size: 1280
backend: "{{ backend }}"
register: check_core_output
check_mode: true
@ -19,14 +19,14 @@
- name: "({{ backend }}) Generate key"
openssh_keypair:
path: "{{ remote_tmp_dir }}/core"
size: 2048
size: 1280
backend: "{{ backend }}"
register: core_output
- name: "({{ backend }}) Generate key (check mode idempotent)"
openssh_keypair:
path: "{{ remote_tmp_dir }}/core"
size: 2048
size: 1280
backend: "{{ backend }}"
register: idempotency_check_core_output
check_mode: true
@ -34,7 +34,7 @@
- name: "({{ backend }}) Generate key (idempotent)"
openssh_keypair:
path: '{{ remote_tmp_dir }}/core'
size: 2048
size: 1280
backend: "{{ backend }}"
register: idempotency_core_output
@ -69,7 +69,7 @@
assert:
that:
- core_output['size']|type_debug == 'int'
- core_output['size'] == 2048
- core_output['size'] == 1280
- name: "({{ backend }}) Assert key returns key type"
assert:
@ -84,7 +84,7 @@
- name: "({{ backend }}) Assert key size matches 'ssh-keygen' output"
assert:
that:
- core_size_ssh_keygen.stdout == '2048'
- core_size_ssh_keygen.stdout == '1280'
- name: "({{ backend }}) Read core.pub"
slurp:

View File

@ -47,7 +47,7 @@
- name: Modify unprotected key with passphrase
openssh_keypair:
path: '{{ remote_tmp_dir }}/unprotected'
size: 2048
size: 1280
passphrase: "{{ passphrase }}"
backend: cryptography
ignore_errors: true
@ -56,7 +56,7 @@
- name: Modify unprotected key with passphrase (force)
openssh_keypair:
path: '{{ remote_tmp_dir }}/unprotected'
size: 2048
size: 1280
passphrase: "{{ passphrase }}"
force: true
backend: cryptography
@ -75,13 +75,14 @@
state: absent
- name: Generate PEM encoded key with passphrase
command: 'ssh-keygen -b 4096 -f {{ remote_tmp_dir }}/pem_encoded -N {{ passphrase }} -m PEM'
command: 'ssh-keygen -b 1280 -f {{ remote_tmp_dir }}/pem_encoded -N {{ passphrase }} -m PEM'
- name: Try to verify a PEM encoded key
openssh_keypair:
path: '{{ remote_tmp_dir }}/pem_encoded'
passphrase: "{{ passphrase }}"
backend: cryptography
size: 1280
register: pem_encoded_output
- name: Check that PEM encoded file is read without errors

View File

@ -104,7 +104,7 @@
- name: "({{ backend }}) Modify key - password_protected"
openssh_keypair:
path: "{{ remote_tmp_dir }}/password_protected"
size: 2048
size: 1280
backend: "{{ backend }}"
register: password_protected_output
ignore_errors: true
@ -118,7 +118,7 @@
- name: "({{ backend }}) Modify key with 'force=true' - password_protected"
openssh_keypair:
path: "{{ remote_tmp_dir }}/password_protected"
size: 2048
size: 1280
backend: "{{ backend }}"
force: true
register: force_password_protected_output

View File

@ -2,6 +2,6 @@
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
azp/generic/1
azp/posix/1
azp/generic/2
azp/posix/2
destructive