Sharp.Augeas/Sharp.Augeas.Test/lens/tests/test_crypttab.aug

63 lines
1.8 KiB
Plaintext

module Test_crypttab =
let simple = "sda1_crypt\t /dev/sda1\t /dev/random \t swap\n"
let simple_tree =
{ "1"
{ "target" = "sda1_crypt" }
{ "device" = "/dev/sda1" }
{ "password" = "/dev/random" }
{ "opt" = "swap" } }
let trailing_ws = "sda1_crypt\t /dev/sda1\t /dev/random \t swap\t\n"
let no_opts = "sda1_crypt\t /dev/sda1\t /etc/key\n"
let no_opts_tree =
{ "1"
{ "target" = "sda1_crypt" }
{ "device" = "/dev/sda1" }
{ "password" = "/etc/key" } }
let no_password = "sda1_crypt\t /dev/sda1\n"
let no_password_tree =
{ "1"
{ "target" = "sda1_crypt" }
{ "device" = "/dev/sda1" } }
let multi_opts = "sda1_crypt\t /dev/sda1\t /etc/key \t cipher=aes-cbc-essiv:sha256,verify\n"
let multi_opts_tree =
{ "1"
{ "target" = "sda1_crypt" }
{ "device" = "/dev/sda1" }
{ "password" = "/etc/key" }
{ "opt" = "cipher"
{ "value" = "aes-cbc-essiv:sha256" } }
{ "opt" = "verify" } }
let uuid = "sda3_crypt UUID=5b8b6e72-acf9-43bc-bd2d-8dbcaee82f99 none luks,keyscript=/usr/share/yubikey-luks/ykluks-keyscript,discard\n"
let uuid_tree =
{ "1"
{ "target" = "sda3_crypt" }
{ "device" = "UUID=5b8b6e72-acf9-43bc-bd2d-8dbcaee82f99" }
{ "password" = "none" }
{ "opt" = "luks" }
{ "opt" = "keyscript"
{ "value" = "/usr/share/yubikey-luks/ykluks-keyscript" } }
{ "opt" = "discard" } }
test Crypttab.lns get simple = simple_tree
test Crypttab.lns get trailing_ws = simple_tree
test Crypttab.lns get no_opts = no_opts_tree
test Crypttab.lns get no_password = no_password_tree
test Crypttab.lns get multi_opts = multi_opts_tree
test Crypttab.lns get uuid = uuid_tree