go.mondoo.com/cnquery@v0.0.0-20231005093811-59568235f6ea/_motor/discovery/testdata/mock.toml (about)

     1  [commands."ls /"]
     2  stdout = "bin  boot  dev  etc  home  lib  lib64  media  mnt  opt  proc  root  run  sbin  srv  sys  tmp  usr  var"
     3  
     4  [commands."uname -m"]
     5  stdout = "x86_64"
     6  
     7  [commands."uname -s"]
     8  stdout = "Linux"
     9  
    10  [commands."hostname"]
    11  stdout = "testmachine"
    12  
    13  [files."/etc/os-release"]
    14  content = """
    15  NAME="Ubuntu"
    16  VERSION="18.04 LTS (Bionic Beaver)"
    17  ID=ubuntu
    18  ID_LIKE=debian
    19  PRETTY_NAME="Ubuntu 18.04 LTS"
    20  VERSION_ID="18.04"
    21  HOME_URL="https://www.ubuntu.com/"
    22  SUPPORT_URL="https://help.ubuntu.com/"
    23  BUG_REPORT_URL="https://bugs.launchpad.net/ubuntu/"
    24  PRIVACY_POLICY_URL="https://www.ubuntu.com/legal/terms-and-policies/privacy-policy"
    25  VERSION_CODENAME=bionic
    26  UBUNTU_CODENAME=bionic
    27  """
    28  
    29  [files."/etc/ssh/sshd_config"]
    30  content = """
    31  #	$OpenBSD: sshd_config,v 1.101 2017/03/14 07:19:07 djm Exp $
    32  
    33  # This is the sshd server system-wide configuration file.  See
    34  # sshd_config(5) for more information.
    35  
    36  # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
    37  
    38  # The strategy used for options in the default sshd_config shipped with
    39  # OpenSSH is to specify options with their default value where
    40  # possible, but leave them commented.  Uncommented options override the
    41  # default value.
    42  
    43  #Port 22
    44  #AddressFamily any
    45  #ListenAddress 0.0.0.0
    46  #ListenAddress ::
    47  
    48  #HostKey /etc/ssh/ssh_host_rsa_key
    49  #HostKey /etc/ssh/ssh_host_dsa_key
    50  #HostKey /etc/ssh/ssh_host_ecdsa_key
    51  #HostKey /etc/ssh/ssh_host_ed25519_key
    52  
    53  # Ciphers and keying
    54  #RekeyLimit default none
    55  
    56  # Logging
    57  #SyslogFacility AUTH
    58  #LogLevel INFO
    59  
    60  # Authentication:
    61  
    62  #LoginGraceTime 2m
    63  #PermitRootLogin prohibit-password
    64  #StrictModes yes
    65  #MaxAuthTries 6
    66  #MaxSessions 10
    67  
    68  #PubkeyAuthentication yes
    69  
    70  # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
    71  # but this is overridden so installations will only check .ssh/authorized_keys
    72  AuthorizedKeysFile	.ssh/authorized_keys
    73  
    74  #AuthorizedPrincipalsFile none
    75  
    76  #AuthorizedKeysCommand none
    77  #AuthorizedKeysCommandUser nobody
    78  
    79  # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
    80  #HostbasedAuthentication no
    81  # Change to yes if you don't trust ~/.ssh/known_hosts for
    82  # HostbasedAuthentication
    83  #IgnoreUserKnownHosts no
    84  # Don't read the user's ~/.rhosts and ~/.shosts files
    85  #IgnoreRhosts yes
    86  
    87  # To disable tunneled clear text passwords, change to no here!
    88  #PasswordAuthentication yes
    89  #PermitEmptyPasswords no
    90  
    91  # Change to no to disable s/key passwords
    92  #ChallengeResponseAuthentication yes
    93  
    94  # Kerberos options
    95  #KerberosAuthentication no
    96  #KerberosOrLocalPasswd yes
    97  #KerberosTicketCleanup yes
    98  #KerberosGetAFSToken no
    99  
   100  # GSSAPI options
   101  #GSSAPIAuthentication no
   102  #GSSAPICleanupCredentials yes
   103  
   104  # Set this to 'yes' to enable PAM authentication, account processing,
   105  # and session processing. If this is enabled, PAM authentication will
   106  # be allowed through the ChallengeResponseAuthentication and
   107  # PasswordAuthentication.  Depending on your PAM configuration,
   108  # PAM authentication via ChallengeResponseAuthentication may bypass
   109  # the setting of "PermitRootLogin without-password".
   110  # If you just want the PAM account and session checks to run without
   111  # PAM authentication, then enable this but set PasswordAuthentication
   112  # and ChallengeResponseAuthentication to 'no'.
   113  UsePAM yes
   114  
   115  #AllowAgentForwarding yes
   116  #AllowTcpForwarding yes
   117  #GatewayPorts no
   118  #X11Forwarding no
   119  #X11DisplayOffset 10
   120  #X11UseLocalhost yes
   121  #PermitTTY yes
   122  #PrintMotd yes
   123  #PrintLastLog yes
   124  #TCPKeepAlive yes
   125  #UseLogin no
   126  #PermitUserEnvironment no
   127  #Compression delayed
   128  #ClientAliveInterval 0
   129  #ClientAliveCountMax 3
   130  #UseDNS no
   131  #PidFile /var/run/sshd.pid
   132  #MaxStartups 10:30:100
   133  #PermitTunnel no
   134  #ChrootDirectory none
   135  #VersionAddendum none
   136  
   137  # pass locale information
   138  AcceptEnv LANG LC_*
   139  
   140  # no default banner path
   141  #Banner none
   142  
   143  # override default of no subsystems
   144  Subsystem	sftp	/usr/libexec/sftp-server
   145  
   146  # Example of overriding settings on a per-user basis
   147  #Match User anoncvs
   148  #	X11Forwarding no
   149  #	AllowTcpForwarding no
   150  #	PermitTTY no
   151  #	ForceCommand cvs server
   152  """
   153  
   154  [files."/sys/class/dmi/id"]
   155    [files."/sys/class/dmi/id".stat]
   156    isdir = true
   157  
   158  [files."/sys/class/dmi/id/bios_date"]
   159  content = "12/01/2006"
   160  
   161  [files."/sys/class/dmi/id/bios_vendor"]
   162  content = "innotek GmbH"