diff options
-rw-r--r-- | doc/guide/commands.md | 2 | ||||
-rw-r--r-- | lib/leap_cli/commands/user.rb | 4 | ||||
m--------- | puppet/modules/couchdb | 0 | ||||
m--------- | puppet/modules/postfix | 0 | ||||
-rw-r--r-- | puppet/modules/site_apt/manifests/sid_repo.pp | 11 | ||||
-rw-r--r-- | puppet/modules/site_couchdb/manifests/master.pp | 5 | ||||
-rw-r--r-- | puppet/modules/site_sshd/manifests/init.pp | 2 | ||||
-rw-r--r-- | puppet/modules/site_static/manifests/init.pp | 10 | ||||
-rw-r--r-- | puppet/modules/site_webapp/manifests/hidden_service.pp | 1 | ||||
-rw-r--r-- | tests/white-box/webapp.rb | 29 |
10 files changed, 11 insertions, 53 deletions
diff --git a/doc/guide/commands.md b/doc/guide/commands.md index 7d0aa1b2..eaacc8d5 100644 --- a/doc/guide/commands.md +++ b/doc/guide/commands.md @@ -47,7 +47,7 @@ SSH public key file for this new user Default Value: None * `--self` -Add yourself as a trusted sysadin by choosing among the public keys available for the current user. +Add yourself as a trusted sysadmin by choosing among the public keys available for the current user. # leap cert diff --git a/lib/leap_cli/commands/user.rb b/lib/leap_cli/commands/user.rb index 480e9a9c..b842e854 100644 --- a/lib/leap_cli/commands/user.rb +++ b/lib/leap_cli/commands/user.rb @@ -17,7 +17,7 @@ module LeapCli arg_name 'USERNAME' #, :optional => false, :multiple => false command :'add-user' do |c| - c.switch 'self', :desc => 'Add yourself as a trusted sysadin by choosing among the public keys available for the current user.', :negatable => false + c.switch 'self', :desc => 'Add yourself as a trusted sysadmin by choosing among the public keys available for the current user.', :negatable => false c.flag 'ssh-pub-key', :desc => 'SSH public key file for this new user' c.flag 'pgp-pub-key', :desc => 'OpenPGP public key file for this new user' @@ -133,4 +133,4 @@ module LeapCli end end -end
\ No newline at end of file +end diff --git a/puppet/modules/couchdb b/puppet/modules/couchdb -Subproject 016ec71359f6b1b368624c6c94bac2b50979165 +Subproject 84b1d857b0ea8a9987be0748dab9f6a3ddaba94 diff --git a/puppet/modules/postfix b/puppet/modules/postfix -Subproject 53572a8934fe5b0a3a567cdec10664f28892373 +Subproject b1875e4143713ee007ce6ceedeef132273a1616 diff --git a/puppet/modules/site_apt/manifests/sid_repo.pp b/puppet/modules/site_apt/manifests/sid_repo.pp deleted file mode 100644 index 7c1d8783..00000000 --- a/puppet/modules/site_apt/manifests/sid_repo.pp +++ /dev/null @@ -1,11 +0,0 @@ -# configure debian unstable aka "sid" -# currently only used for installations that -# use plain couchdb instead of bigcouch -class site_apt::sid_repo { - - apt::sources_list { 'debian_sid.list': - content => "deb http://httpredir.debian.org/debian/ sid main\n", - before => Exec[refresh_apt] - } - -} diff --git a/puppet/modules/site_couchdb/manifests/master.pp b/puppet/modules/site_couchdb/manifests/master.pp index c50ed364..5dab6325 100644 --- a/puppet/modules/site_couchdb/manifests/master.pp +++ b/puppet/modules/site_couchdb/manifests/master.pp @@ -7,10 +7,5 @@ class site_couchdb::master { pwhash_alg => $site_couchdb::couchdb_pwhash_alg } - # couchdb is not available in jessie, and the - # leap deb repo only hosts a wheeyz version. - # we install it therefore from unstable - include site_apt::sid_repo - include site_check_mk::agent::couchdb::master } diff --git a/puppet/modules/site_sshd/manifests/init.pp b/puppet/modules/site_sshd/manifests/init.pp index 5efd459f..be0d3368 100644 --- a/puppet/modules/site_sshd/manifests/init.pp +++ b/puppet/modules/site_sshd/manifests/init.pp @@ -75,7 +75,7 @@ MACs hmac-sha2-512,hmac-sha2-256,hmac-ripemd160' print_motd => 'no', tcp_forwarding => $ssh_config['AllowTcpForwarding'], manage_client => false, - use_storedconfigs => true, + use_storedconfigs => false, tail_additional_options => $tail_additional_options } } diff --git a/puppet/modules/site_static/manifests/init.pp b/puppet/modules/site_static/manifests/init.pp index 8df53075..e317f580 100644 --- a/puppet/modules/site_static/manifests/init.pp +++ b/puppet/modules/site_static/manifests/init.pp @@ -28,10 +28,12 @@ class site_static { } } - include site_apache::module::headers - include site_apache::module::alias - include site_apache::module::expires - include site_apache::module::removeip + include apache::module::headers + include apache::module::alias + include apache::module::expires + include apache::module::removeip + include apache::module::dir + include apache::module::negotiation include site_apache::common include site_config::ruby::dev diff --git a/puppet/modules/site_webapp/manifests/hidden_service.pp b/puppet/modules/site_webapp/manifests/hidden_service.pp index 4cf7a8ca..efdefd8e 100644 --- a/puppet/modules/site_webapp/manifests/hidden_service.pp +++ b/puppet/modules/site_webapp/manifests/hidden_service.pp @@ -8,6 +8,7 @@ class site_webapp::hidden_service { include apache::module::alias include apache::module::expires include apache::module::removeip + include apache::module::status include tor::daemon tor::daemon::hidden_service { 'webapp': ports => '80 127.0.0.1:80' } diff --git a/tests/white-box/webapp.rb b/tests/white-box/webapp.rb index e689c143..48507521 100644 --- a/tests/white-box/webapp.rb +++ b/tests/white-box/webapp.rb @@ -41,35 +41,6 @@ class Webapp < LeapTest pass end - def test_05_Can_create_and_authenticate_and_delete_user_via_API? - if property('webapp.allow_registration') - assert_tmp_user - pass - else - skip "New user registrations are disabled." - end - end - - def test_06_Can_sync_Soledad? - return unless property('webapp.allow_registration') - soledad_config = property('definition_files.soledad_service') - if soledad_config && !soledad_config.empty? - soledad_server = pick_soledad_server(soledad_config) - if soledad_server - assert_tmp_user do |user| - command = File.expand_path "../../helpers/soledad_sync.py", __FILE__ - soledad_url = "https://#{soledad_server}/user-#{user.id}" - soledad_cert = "/usr/local/share/ca-certificates/leap_ca.crt" - assert_run "#{command} #{user.id} #{user.session_token} #{soledad_url} #{soledad_cert} #{user.password}" - assert_user_db_exists(user) - pass - end - end - else - skip 'No soledad service configuration' - end - end - private def url_options |