Server IP : 127.0.0.2 / Your IP : 3.17.173.228 Web Server : Apache/2.4.18 (Ubuntu) System : User : www-data ( ) PHP Version : 7.0.33-0ubuntu0.16.04.16 Disable Function : disk_free_space,disk_total_space,diskfreespace,dl,exec,fpaththru,getmyuid,getmypid,highlight_file,ignore_user_abord,leak,listen,link,opcache_get_configuration,opcache_get_status,passthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,php_uname,phpinfo,posix_ctermid,posix_getcwd,posix_getegid,posix_geteuid,posix_getgid,posix_getgrgid,posix_getgrnam,posix_getgroups,posix_getlogin,posix_getpgid,posix_getpgrp,posix_getpid,posix,_getppid,posix_getpwnam,posix_getpwuid,posix_getrlimit,posix_getsid,posix_getuid,posix_isatty,posix_kill,posix_mkfifo,posix_setegid,posix_seteuid,posix_setgid,posix_setpgid,posix_setsid,posix_setuid,posix_times,posix_ttyname,posix_uname,pclose,popen,proc_open,proc_close,proc_get_status,proc_nice,proc_terminate,shell_exec,source,show_source,system,virtual MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /usr/share/augeas/lenses/dist/tests/ |
Upload File : |
(* Module: Test_sshd *) module Test_sshd = let accept_env = "Protocol 2 AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT AcceptEnv LC_IDENTIFICATION LC_ALL\n" test Sshd.lns get accept_env = { "Protocol" = "2" } { "AcceptEnv" { "1" = "LC_PAPER" } { "2" = "LC_NAME" } { "3" = "LC_ADDRESS" } { "4" = "LC_TELEPHONE" } { "5" = "LC_MEASUREMENT" } } { "AcceptEnv" { "6" = "LC_IDENTIFICATION" } { "7" = "LC_ALL" } } test Sshd.lns get "HostKey /etc/ssh/ssh_host_rsa_key HostKey /etc/ssh/ssh_host_dsa_key\n" = { "HostKey" = "/etc/ssh/ssh_host_rsa_key" } { "HostKey" = "/etc/ssh/ssh_host_dsa_key" } test Sshd.lns put accept_env after rm "AcceptEnv"; rm "AcceptEnv"; set "Protocol" "1.5"; set "X11Forwarding" "yes" = "Protocol 1.5\nX11Forwarding yes\n" test Sshd.lns get "AuthorizedKeysFile %h/.ssh/authorized_keys\n" = { "AuthorizedKeysFile" = "%h/.ssh/authorized_keys" } test Sshd.lns get "Subsystem sftp /usr/lib/openssh/sftp-server\n" = { "Subsystem" { "sftp" = "/usr/lib/openssh/sftp-server" } } test Sshd.lns get "Subsystem sftp-test /usr/lib/openssh/sftp-server\n" = { "Subsystem" { "sftp-test" = "/usr/lib/openssh/sftp-server" } } let match_blocks = "X11Forwarding yes Match User sarko Group pres.* Banner /etc/bienvenue.txt X11Forwarding no Match User bush Group pres.* Host white.house.* Banner /etc/welcome.txt " test Sshd.lns get match_blocks = { "X11Forwarding" = "yes"} { "Match" { "Condition" { "User" = "sarko" } { "Group" = "pres.*" } } { "Settings" { "Banner" = "/etc/bienvenue.txt" } { "X11Forwarding" = "no" } } } { "Match" { "Condition" { "User" = "bush" } { "Group" = "pres.*" } { "Host" = "white.house.*" } } { "Settings" { "Banner" = "/etc/welcome.txt" } } } test Sshd.lns put match_blocks after insb "Subsystem" "/Match[1]"; set "/Subsystem/sftp" "/usr/libexec/openssh/sftp-server" = "X11Forwarding yes Subsystem sftp /usr/libexec/openssh/sftp-server Match User sarko Group pres.* Banner /etc/bienvenue.txt X11Forwarding no Match User bush Group pres.* Host white.house.* Banner /etc/welcome.txt\n" (* Test: Sshd.lns Indent when adding to a Match group *) test Sshd.lns put match_blocks after set "Match[1]/Settings/PermitRootLogin" "yes"; set "Match[1]/Settings/#comment" "a comment" = "X11Forwarding yes Match User sarko Group pres.* Banner /etc/bienvenue.txt X11Forwarding no PermitRootLogin yes # a comment Match User bush Group pres.* Host white.house.* Banner /etc/welcome.txt\n" (* Test: Sshd.lns Parse Ciphers and KexAlgorithms as lists (GH issue #69) *) test Sshd.lns get "Ciphers aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes128-ctr KexAlgorithms diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1\n" = { "Ciphers" { "1" = "aes256-gcm@openssh.com" } { "2" = "aes128-gcm@openssh.com" } { "3" = "aes256-ctr" } { "4" = "aes128-ctr" } } { "KexAlgorithms" { "1" = "diffie-hellman-group-exchange-sha256" } { "2" = "diffie-hellman-group14-sha1" } { "3" = "diffie-hellman-group-exchange-sha1" } } (* Test: Sshd.lns Keys are case-insensitive *) test Sshd.lns get "ciPheRs aes256-gcm@openssh.com,aes128-ctr maTcH User foo x11forwarding no\n" = { "ciPheRs" { "1" = "aes256-gcm@openssh.com" } { "2" = "aes128-ctr" } } { "maTcH" { "Condition" { "User" = "foo" } } { "Settings" { "x11forwarding" = "no" } } } (* Test: Sshd.lns Allow AllowGroups in Match groups (GH issue #75) *) test Sshd.lns get "Match User foo AllowGroups users\n" = { "Match" { "Condition" { "User" = "foo" } } { "Settings" { "AllowGroups" { "1" = "users" } } } } (* Local Variables: *) (* mode: caml *) (* End: *)