Skip to content

Commit 079cbb0

Browse files
committed
Merge remote-tracking branch 'origin/master' into edge
2 parents 8d20cc4 + 011252d commit 079cbb0

File tree

7 files changed

+19
-19
lines changed

7 files changed

+19
-19
lines changed

tests/fixture/confs-stdlocal/MiG.conf

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ServerAdmin testuser
1414
# We may need to run as MiG user or group for file access to work
1515
# through CGI scripts and for direct user file access
1616
User testuser
17-
Group tesggroup
17+
Group testgroup
1818

1919
# Performance Tuning
2020
StartServers 5
@@ -188,7 +188,7 @@ Alias /.well-known/security.txt "/home/mig/state/wwwpublic/.well-known/security.
188188
# Please note that the processes number here is a FIXED cap on available
189189
# worker processes so it strictly limits the number of concurrent clients.
190190
<IfDefine BASE_FQDN>
191-
WSGIDaemonProcess ${BASE_FQDN} processes=10 threads=1 display-name=%{GROUP} user=testuser group=tesggroup python-path=/home/mig/mig maximum-requests=1000
191+
WSGIDaemonProcess ${BASE_FQDN} processes=10 threads=1 display-name=%{GROUP} user=testuser group=testgroup python-path=/home/mig/mig maximum-requests=1000
192192
WSGIProcessGroup ${BASE_FQDN}
193193
</IfDefine>
194194
# Make sure wsgi sockets are fully accessible to testuser
@@ -1015,7 +1015,7 @@ Alias /.well-known/security.txt "/home/mig/state/wwwpublic/.well-known/security.
10151015

10161016
RewriteMap escape int:escape
10171017
RewriteMap unescape int:unescape
1018-
RewriteMap chkuserroot prg:/home/mig/mig/server/chkuserroot.py testuser:tesggroup
1018+
RewriteMap chkuserroot prg:/home/mig/mig/server/chkuserroot.py testuser:testgroup
10191019

10201020
# Careful to avoid breakage with exotic chars like percent in filenames.
10211021
# Prepend certificate DN so that we can modify it further without PATH
@@ -1474,7 +1474,7 @@ Alias /.well-known/security.txt "/home/mig/state/wwwpublic/.well-known/security.
14741474

14751475
RewriteMap escape int:escape
14761476
RewriteMap unescape int:unescape
1477-
RewriteMap chkuserroot prg:/home/mig/mig/server/chkuserroot.py testuser:tesggroup
1477+
RewriteMap chkuserroot prg:/home/mig/mig/server/chkuserroot.py testuser:testgroup
14781478

14791479
# Careful to avoid breakage with exotic chars like percent in filenames.
14801480
# Prepend certificate DN so that we can modify it further without PATH
@@ -2149,7 +2149,7 @@ Alias /.well-known/security.txt "/home/mig/state/wwwpublic/.well-known/security.
21492149

21502150
RewriteMap escape int:escape
21512151
RewriteMap unescape int:unescape
2152-
RewriteMap chkuserroot prg:/home/mig/mig/server/chkuserroot.py testuser:tesggroup
2152+
RewriteMap chkuserroot prg:/home/mig/mig/server/chkuserroot.py testuser:testgroup
21532153

21542154
# Careful to avoid breakage with exotic chars like percent in filenames.
21552155
# Fake certificate DN so that we can modify it further without PATH
@@ -2750,7 +2750,7 @@ Alias /.well-known/security.txt "/home/mig/state/wwwpublic/.well-known/security.
27502750

27512751
RewriteMap escape int:escape
27522752
RewriteMap unescape int:unescape
2753-
RewriteMap chkuserroot prg:/home/mig/mig/server/chkuserroot.py testuser:tesggroup
2753+
RewriteMap chkuserroot prg:/home/mig/mig/server/chkuserroot.py testuser:testgroup
27542754

27552755
# Careful to avoid breakage with exotic chars like percent in filenames.
27562756
# Fake certificate DN so that we can modify it further without PATH
@@ -3666,7 +3666,7 @@ Alias /.well-known/security.txt "/home/mig/state/wwwpublic/.well-known/security.
36663666

36673667
RewriteMap escape int:escape
36683668
RewriteMap unescape int:unescape
3669-
RewriteMap chkuserroot prg:/home/mig/mig/server/chkuserroot.py testuser:tesggroup
3669+
RewriteMap chkuserroot prg:/home/mig/mig/server/chkuserroot.py testuser:testgroup
36703670

36713671
# NOTE: the REMOTE_USER below requires a recent mod_auth_openidc to work.
36723672
# It was just empty with mod_auth_openidc-1.8.8 but works with 2.4.12
@@ -4148,7 +4148,7 @@ Alias /.well-known/security.txt "/home/mig/state/wwwpublic/.well-known/security.
41484148

41494149
# Set up chroot checking helper
41504150

4151-
RewriteMap chksidroot prg:/home/mig/mig/server/chksidroot.py testuser:tesggroup
4151+
RewriteMap chksidroot prg:/home/mig/mig/server/chksidroot.py testuser:testgroup
41524152

41534153
# Prevent e.g. symlinks escaping user chroots hidden behind session or
41544154
# sharelink symlinks.

tests/fixture/confs-stdlocal/envvars

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ APACHE_SUFFIX=
1313
# settings are defined via environment variables and then used in apache(2)?ctl,
1414
# /etc/init.d/${APACHE_DAEMON}, /etc/logrotate.d/${APACHE_DAEMON}, etc.
1515
APACHE_RUN_USER=testuser
16-
APACHE_RUN_GROUP=tesggroup
16+
APACHE_RUN_GROUP=testgroup
1717
APACHE_PID_FILE=/var/run/apache2.pid
1818
APACHE_RUN_DIR=/var/run
1919
APACHE_LOCK_DIR=/var/lock

tests/fixture/confs-stdlocal/logrotate-migrid

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@
55
compress
66
delaycompress
77
notifempty
8-
create 640 testuser tesggroup
8+
create 640 testuser testgroup
99
# NOTE we need root to restart services
10-
#su testuser tesggroup
11-
su root tesggroup
10+
#su testuser testgroup
11+
su root testgroup
1212
sharedscripts
1313
postrotate
1414
service migrid reload; \

tests/fixture/confs-stdlocal/migcheckssl

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ export PATH="/usr/local/sbin:${PATH}"
3030

3131
domain=""
3232
mig_user="testuser"
33-
mig_group="tesggroup"
33+
mig_group="testgroup"
3434
cert_base="/home/mig/certs"
3535
cert_path="${cert_base}/letsencrypt"
3636
domain_cert_path="${cert_path}/${domain}"

tests/fixture/confs-stdlocal/sshd_config-MiG-sftp-subsys

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -161,13 +161,13 @@ MaxStartups 10:30:100
161161
Subsystem sftp /home/mig/mig/server/sftp_subsys.py
162162

163163
# IMPORTANT: please make sure to also restrict any native sshd to deny login
164-
# from ALL users entering as user testuser or group tesggroup with
164+
# from ALL users entering as user testuser or group testgroup with
165165
# DenyUsers testuser
166-
# DenyGroups tesggroup
166+
# DenyGroups testgroup
167167

168168
# NOTE: Only allow MiG users on this sshd instance, and sftp-only access
169-
AllowGroups tesggroup
170-
Match Group tesggroup
169+
AllowGroups testgroup
170+
Match Group testgroup
171171
# Look for public keys in standard authorized_keys file in home and
172172
# optionally in job and jupyter session mount key location if enabled.
173173
AuthorizedKeysFile %h/.ssh/authorized_keys

tests/support.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ def warning(self, line):
129129
def write(self, message):
130130
channel, namespace, specifics = message.split(':', 2)
131131

132-
# ignore everything except warnings sent by th python runtime
132+
# ignore everything except warnings sent by the python runtime
133133
if not (channel == 'WARNING' and namespace == 'py.warnings'):
134134
return
135135

tests/test_mig_shared_install.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ def test_creates_output_directory_containing_a_standard_local_configuration(self
8282
destination=symlink_path,
8383
destination_suffix='-stdlocal',
8484
user='testuser',
85-
group='tesggroup',
85+
group='testgroup',
8686
timezone='Test/Place',
8787
crypto_salt='_TEST_CRYPTO_SALT'.zfill(32),
8888
digest_salt='_TEST_DIGEST_SALT'.zfill(32),

0 commit comments

Comments
 (0)