|
276 | 276 |
|
277 | 277 | context 'String[1]' do
|
278 | 278 | [
|
279 |
| - 'Match', 'BindAddress', 'BindInterface', 'CanonicalDomains', 'CanonicalizePermittedCNAMEs', 'CASignatureAlgorithms', |
280 |
| - 'CertificateFile', 'Ciphers', 'ControlPath', 'ControlPersist', 'DynamicForward', 'EscapeChar', 'GlobalKnownHostsFile', |
281 |
| - 'HostbasedAcceptedAlgorithms', 'HostKeyAlgorithms', 'HostKeyAlias', 'Hostname', 'IdentityAgent', 'IdentityFile', |
282 |
| - 'IgnoreUnknown', 'Include', 'IPQoS', 'KbdInteractiveDevices', 'KexAlgorithms', 'KnownHostsCommand', 'LocalCommand', |
283 |
| - 'LocalForward', 'LogVerbose', 'MACs', 'PermitRemoteOpen', 'PKCS11Provider', 'PreferredAuthentications', 'ProxyCommand', |
284 |
| - 'ProxyJump', 'PubkeyAcceptedAlgorithms', 'RekeyLimit', 'RemoteCommand', 'RemoteForward', 'RevokedHostKeys', |
285 |
| - 'SecurityKeyProvider', 'SendEnv', 'SetEnv', 'TunnelDevice', 'User', 'UserKnownHostsFile', 'XAuthLocation' |
| 279 | + 'Match', 'BindAddress', 'BindInterface', 'CanonicalDomains', |
| 280 | + 'CanonicalizePermittedCNAMEs', 'CASignatureAlgorithms', |
| 281 | + 'CertificateFile', 'Ciphers', 'ControlPath', 'ControlPersist', |
| 282 | + 'DynamicForward', 'EscapeChar', 'GlobalKnownHostsFile', 'Host', |
| 283 | + 'HostbasedAcceptedAlgorithms', 'HostKeyAlgorithms', 'HostKeyAlias', |
| 284 | + 'Hostname', 'IdentityAgent', 'IdentityFile', 'IgnoreUnknown', 'Include', |
| 285 | + 'IPQoS', 'KbdInteractiveDevices', 'KexAlgorithms', 'KnownHostsCommand', |
| 286 | + 'LocalCommand', 'LocalForward', 'LogVerbose', 'MACs', 'PermitRemoteOpen', |
| 287 | + 'PKCS11Provider', 'PreferredAuthentications', 'ProxyCommand', |
| 288 | + 'ProxyJump', 'PubkeyAcceptedAlgorithms', 'RekeyLimit', 'RemoteCommand', |
| 289 | + 'RemoteForward', 'RevokedHostKeys', 'SecurityKeyProvider', 'SendEnv', |
| 290 | + 'SetEnv', 'TunnelDevice', 'User', 'UserKnownHostsFile', 'XAuthLocation' |
286 | 291 | ].each do |directive|
|
287 | 292 | describe directive.inspect do
|
288 | 293 | [
|
|
337 | 342 | end
|
338 | 343 | end
|
339 | 344 |
|
340 |
| - context 'Stdlib::Host' do |
341 |
| - [ |
342 |
| - 'Host', |
343 |
| - ].each do |directive| |
344 |
| - describe directive.inspect do |
345 |
| - [ |
346 |
| - 'string', 'host.domain.tld', '242.242.242.242', '242', nil, :keyword # FIXME: unsure why nil and :keyword are actually supported |
347 |
| - ].each do |valid| |
348 |
| - it { is_expected.to allow_value(directive => valid) } |
349 |
| - end |
350 |
| - [ |
351 |
| - '_invalid.domain.tld', 'ネット', ['array'], { 'ha' => 'sh' }, [], '', 242, 0x242, true, false, [nil], [nil, nil] |
352 |
| - ].each do |invalid| |
353 |
| - it { is_expected.not_to allow_value(directive => invalid) } |
354 |
| - end |
355 |
| - end |
356 |
| - end |
357 |
| - end |
358 |
| - |
359 | 345 | context 'Stdlib::Port' do
|
360 | 346 | [
|
361 | 347 | 'Port',
|
|
0 commit comments