/usr/share/augeas/lenses/dist/tests/test_ntp.aug is in augeas-lenses 1.10.1-2.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 | module Test_ntp =
let conf = "#
# Fichier genere par puppet
# Environnement: development
server dns01.echo-net.net version 3
server dns02.echo-net.net version 4
driftfile /var/lib/ntp/ntp.drift
restrict default ignore
#server dns01.echo-net.net
restrict 192.168.0.150 nomodify
# allow everything from localhost
restrict 127.0.0.1
logfile /var/log/ntpd
statsdir /var/log/ntpstats/
ntpsigndsocket /var/lib/samba/ntp_signd
statistics loopstats peerstats clockstats
filegen loopstats file loopstats type day enable link
filegen peerstats file peerstats type day disable
filegen clockstats file clockstats type day enable nolink
interface ignore wildcard
interface listen 127.0.0.1
"
test Ntp.lns get conf =
{ "#comment" = "" }
{ "#comment" = "Fichier genere par puppet" }
{ "#comment" = "Environnement: development" }
{}
{ "server" = "dns01.echo-net.net"
{ "version" = "3" } }
{ "server" = "dns02.echo-net.net"
{ "version" = "4" } }
{}
{ "driftfile" = "/var/lib/ntp/ntp.drift" }
{}
{ "restrict" = "default"
{ "action" = "ignore" } }
{}
{ "#comment" = "server dns01.echo-net.net" }
{ "restrict" = "192.168.0.150"
{ "action" = "nomodify" } }
{}
{ "#comment" = "allow everything from localhost" }
{ "restrict" = "127.0.0.1" }
{}
{ "logfile" = "/var/log/ntpd" }
{ "statsdir" = "/var/log/ntpstats/" }
{ "ntpsigndsocket" = "/var/lib/samba/ntp_signd" }
{}
{ "statistics"
{ "loopstats" }
{ "peerstats" }
{ "clockstats" } }
{ "filegen" = "loopstats"
{ "file" = "loopstats" }
{ "type" = "day" }
{ "enable" = "enable" }
{ "link" = "link" } }
{ "filegen" = "peerstats"
{ "file" = "peerstats" }
{ "type" = "day" }
{ "enable" = "disable" } }
{ "filegen" = "clockstats"
{ "file" = "clockstats" }
{ "type" = "day" }
{ "enable" = "enable" }
{ "link" = "nolink" } }
{ }
{ "interface"
{ "action" = "ignore" }
{ "addresses" = "wildcard" } }
{ "interface"
{ "action" = "listen" }
{ "addresses" = "127.0.0.1" } }
(* Some things needed to process the default ntp.conf on Fedora *)
test Ntp.lns get
"server 66.187.233.4 # added by /sbin/dhclient-script\n" =
{ "server" = "66.187.233.4"
{ "#comment" = "# added by /sbin/dhclient-script" } }
test Ntp.lns get
"server 0.fedora.pool.ntp.org iburst dynamic\n" =
{ "server" = "0.fedora.pool.ntp.org" { "iburst" } { "dynamic" } }
test Ntp.lns get
"restrict 127.0.0.1 \n" =
{ "restrict" = "127.0.0.1" }
test Ntp.lns get
"restrict default kod nomodify notrap nopeer noquery\n" =
{ "restrict" = "default"
{ "action" = "kod" }
{ "action" = "nomodify" }
{ "action" = "notrap" }
{ "action" = "nopeer" }
{ "action" = "noquery" } }
test Ntp.lns put
"restrict default kod nomodify notrap nopeer noquery\n"
after
insb "ipv6" "restrict/action[1]" =
"restrict -6 default kod nomodify notrap nopeer noquery\n"
test Ntp.lns get
"restrict -6 default kod nomodify notrap nopeer noquery\n" =
{ "restrict" = "default"
{ "ipv6" }
{ "action" = "kod" }
{ "action" = "nomodify" }
{ "action" = "notrap" }
{ "action" = "nopeer" }
{ "action" = "noquery" } }
test Ntp.lns put
"restrict default kod nomodify notrap nopeer noquery\n"
after
insb "ipv4" "restrict/action[1]" =
"restrict -4 default kod nomodify notrap nopeer noquery\n"
test Ntp.lns get
"restrict -4 default notrap nomodify nopeer noquery\n" =
{ "restrict" = "default"
{ "ipv4" }
{ "action" = "notrap" }
{ "action" = "nomodify" }
{ "action" = "nopeer" }
{ "action" = "noquery" } }
test Ntp.lns get
"includefile /etc/ntp/crypto/pw\n" =
{ "includefile" = "/etc/ntp/crypto/pw" }
test Ntp.lns get "fudge 127.127.1.0 stratum 10\n" =
{ "fudge" = "127.127.1.0" { "stratum" = "10" } }
test Ntp.lns get "broadcast 192.168.1.255 key 42\n" =
{ "broadcast" = "192.168.1.255" { "key" = "42" } }
test Ntp.lns get "multicastclient 224.0.1.1\n" =
{ "multicastclient" = "224.0.1.1" }
test Ntp.lns put "broadcastclient\tnovolley # broadcast\n"
after rm "/*/novolley" = "broadcastclient # broadcast\n"
test Ntp.auth_command get "trustedkey 4 8 42\n" =
{ "trustedkey"
{ "key" = "4" }
{ "key" = "8" }
{ "key" = "42" } }
test Ntp.auth_command get "trustedkey 42\n" =
{ "trustedkey" { "key" = "42" } }
test Ntp.lns get "broadcastdelay 0.008\n" =
{ "broadcastdelay" = "0.008" }
test Ntp.lns get "enable auth calibrate\ndisable kernel stats\n" =
{ "enable"
{ "flag" = "auth" }
{ "flag" = "calibrate" } }
{ "disable"
{ "flag" = "kernel" }
{ "flag" = "stats" } }
(* Bug #103: tinker directive *)
test Ntp.tinker get "tinker panic 0 huffpuff 3.14\n" =
{ "tinker"
{ "panic" = "0" }
{ "huffpuff" = "3.14" } }
(* Bug #297: tos directive *)
test Ntp.tos get "tos maxdist 16\n" =
{ "tos"
{ "maxdist" = "16" } }
|