From 13e261440e918fdcf25fb967c1da04a195afcba4 Mon Sep 17 00:00:00 2001 From: Aiden Baker Date: Tue, 8 Oct 2024 13:09:26 -0400 Subject: [PATCH] Comment rewording --- tests/api2/test_openssl.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tests/api2/test_openssl.py b/tests/api2/test_openssl.py index 1bd810088733c..2acbc8d45a561 100644 --- a/tests/api2/test_openssl.py +++ b/tests/api2/test_openssl.py @@ -12,7 +12,7 @@ @pytest.mark.skipif(not ha, reason='Test only valid for HA') def test_fips_version(): # The reason we have a set of commands in a payload is because of some annoying FIPS technicalities. - # Basically, when FIPS is enabled, we can't use SSH because the SSH key used by root isn't using a FIPS provided algorithm. + # Basically, when FIPS is enabled, we can't use SSH because the SSH key used by root isn't using a FIPS provided algorithm. (this might need to be investigated further) # To allow testing, we write our FIPS information to a file during this phase, and then go disable FIPS to get SSH back all in one joint command. payload = """midclt call --job system.security.update '{"enable_fips": true}' && openssl list -providers > /root/osslproviders && midclt call system.reboot.info >> /root/osslproviders && midclt call --job system.security.update '{"enable_fips": false}'""" for i in range(retry): @@ -24,7 +24,7 @@ def test_fips_version(): request = ssh(payload, complete_response=True, timeout=300) # fail the test enabled_info = ssh("cat /root/osslproviders") - # Check that things are what we expect when fips was enabled + # Check that things are what we expect when FIPS was enabled assert "3.0.9" in enabled_info assert "FIPS configuration was changed." in enabled_info