# STDOUT: ---v---v---v---v---v--- ansible-playbook [core 2.16.5] config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.16/lib/python3.11/site-packages/ansible ansible collection location = /WORKDIR/git-weekly-ci7ke6dew7/.collection executable location = /opt/ansible-2.16/bin/ansible-playbook python version = 3.11.7 (main, Jan 22 2024, 00:00:00) [GCC 11.4.1 20231218 (Red Hat 11.4.1-3)] (/opt/ansible-2.16/bin/python) jinja version = 3.1.3 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_host_to_unmanaged_host.yml ************************************* 1 plays in /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml PLAY [Test tunnels to hosts not managed by Ansible] **************************** TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:3 Friday 12 July 2024 09:58:02 +0000 (0:00:00.018) 0:00:00.018 *********** ok: [sut] TASK [Set up test environment] ************************************************* task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:12 Friday 12 July 2024 09:58:03 +0000 (0:00:00.778) 0:00:00.796 *********** included: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml for sut TASK [Set platform/version specific variables] ********************************* task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:2 Friday 12 July 2024 09:58:03 +0000 (0:00:00.027) 0:00:00.824 *********** TASK [fedora.linux_system_roles.vpn : Ensure ansible_facts used by role] ******* task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 Friday 12 July 2024 09:58:03 +0000 (0:00:00.027) 0:00:00.851 *********** skipping: [sut] => { "changed": false, "false_condition": "__vpn_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Check if system is ostree] *************** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:10 Friday 12 July 2024 09:58:03 +0000 (0:00:00.028) 0:00:00.880 *********** ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [fedora.linux_system_roles.vpn : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:15 Friday 12 July 2024 09:58:03 +0000 (0:00:00.259) 0:00:01.140 *********** ok: [sut] => { "ansible_facts": { "__vpn_is_ostree": false }, "changed": false } TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:19 Friday 12 July 2024 09:58:03 +0000 (0:00:00.024) 0:00:01.164 *********** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "CentOS.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=CentOS_7.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/CentOS_7.yml" ], "ansible_loop_var": "item", "changed": false, "item": "CentOS_7.yml" } skipping: [sut] => (item=CentOS_7.9.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "CentOS_7.9.yml", "skip_reason": "Conditional result was False" } TASK [Change inventory_hostname] *********************************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:11 Friday 12 July 2024 09:58:03 +0000 (0:00:00.038) 0:00:01.203 *********** ok: [sut] => { "ansible_facts": { "inventory_hostname": "mainhost.local" }, "changed": false } TASK [Add sample main host] **************************************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:18 Friday 12 July 2024 09:58:03 +0000 (0:00:00.031) 0:00:01.235 *********** creating host via 'add_host': hostname=mainhost.local changed: [sut] => { "add_host": { "groups": [], "host_name": "mainhost.local", "host_vars": {} }, "changed": true } TASK [Create nss directory for testing] **************************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:22 Friday 12 July 2024 09:58:03 +0000 (0:00:00.033) 0:00:01.268 *********** changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 4096, "state": "directory", "uid": 0 } TASK [Create /etc/ipsec.d directory for testing] ******************************* task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:28 Friday 12 July 2024 09:58:04 +0000 (0:00:00.279) 0:00:01.547 *********** ok: [sut] => { "changed": false, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 4096, "state": "directory", "uid": 0 } TASK [Dynamically add more hosts] ********************************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:34 Friday 12 July 2024 09:58:04 +0000 (0:00:00.180) 0:00:01.728 *********** included: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/add_hosts.yml for sut TASK [Dynamically add multiple hosts for testing] ****************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/add_hosts.yml:2 Friday 12 July 2024 09:58:04 +0000 (0:00:00.016) 0:00:01.744 *********** creating host via 'add_host': hostname=host01.local creating host via 'add_host': hostname=host02.local changed: [sut] => (item=1) => { "add_host": { "groups": [ "testing" ], "host_name": "host01.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 1 } changed: [sut] => (item=2) => { "add_host": { "groups": [ "testing" ], "host_name": "host02.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 2 } TASK [Create mock vpn_connections] ********************************************* task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/add_hosts.yml:11 Friday 12 July 2024 09:58:04 +0000 (0:00:00.050) 0:00:01.795 *********** ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "hosts": { "host01.local": "", "host02.local": "", "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [Create sample policies directory for testing] **************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:40 Friday 12 July 2024 09:58:04 +0000 (0:00:00.024) 0:00:01.819 *********** skipping: [sut] => { "changed": false, "false_condition": "__vpn_opportunistic | d(false)", "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:46 Friday 12 July 2024 09:58:04 +0000 (0:00:00.033) 0:00:01.853 *********** skipping: [sut] => { "changed": false, "false_condition": "__vpn_opportunistic | d(false)", "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:52 Friday 12 July 2024 09:58:04 +0000 (0:00:00.034) 0:00:01.887 *********** skipping: [sut] => { "changed": false, "false_condition": "__vpn_opportunistic | d(false)", "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:58 Friday 12 July 2024 09:58:04 +0000 (0:00:00.033) 0:00:01.921 *********** skipping: [sut] => { "changed": false, "false_condition": "__vpn_opportunistic | d(false)", "skip_reason": "Conditional result was False" } TASK [Ensure firewalld not running if not testing firewall] ******************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:67 Friday 12 July 2024 09:58:04 +0000 (0:00:00.034) 0:00:01.955 *********** ok: [sut] => { "changed": false, "enabled": false, "failed_when_result": false, "name": "firewalld", "state": "stopped", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "polkit.service system.slice basic.target dbus.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target network-pre.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "iptables.service ipset.service ip6tables.service shutdown.target ebtables.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "Wants": "network-pre.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [Add extra options and unmanaged host] ************************************ task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:15 Friday 12 July 2024 09:58:05 +0000 (0:00:00.500) 0:00:02.456 *********** ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "hosts": { "host01.local": "", "host02.local": "", "host03.local": { "hostname": "169.254.1.1" }, "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [Use vpn role] ************************************************************ task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:24 Friday 12 July 2024 09:58:05 +0000 (0:00:00.049) 0:00:02.505 *********** TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:3 Friday 12 July 2024 09:58:05 +0000 (0:00:00.044) 0:00:02.550 *********** included: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml for sut TASK [fedora.linux_system_roles.vpn : Ensure ansible_facts used by role] ******* task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 Friday 12 July 2024 09:58:05 +0000 (0:00:00.020) 0:00:02.570 *********** skipping: [sut] => { "changed": false, "false_condition": "__vpn_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Check if system is ostree] *************** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:10 Friday 12 July 2024 09:58:05 +0000 (0:00:00.028) 0:00:02.599 *********** skipping: [sut] => { "changed": false, "false_condition": "not __vpn_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:15 Friday 12 July 2024 09:58:05 +0000 (0:00:00.020) 0:00:02.619 *********** skipping: [sut] => { "changed": false, "false_condition": "not __vpn_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:19 Friday 12 July 2024 09:58:05 +0000 (0:00:00.019) 0:00:02.639 *********** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "CentOS.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=CentOS_7.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/CentOS_7.yml" ], "ansible_loop_var": "item", "changed": false, "item": "CentOS_7.yml" } skipping: [sut] => (item=CentOS_7.9.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "CentOS_7.9.yml", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Ensure required packages are installed] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:6 Friday 12 July 2024 09:58:05 +0000 (0:00:00.040) 0:00:02.679 *********** changed: [sut] => { "changed": true, "changes": { "installed": [ "libreswan" ] }, "rc": 0, "results": [ "iproute-4.11.0-30.el7.x86_64 providing iproute is already installed", "Loaded plugins: fastestmirror\nLoading mirror speeds from cached hostfile\nResolving Dependencies\n--> Running transaction check\n---> Package libreswan.x86_64 0:3.25-9.1.el7_8 will be installed\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nInstalling:\n libreswan x86_64 3.25-9.1.el7_8 updates 1.4 M\n\nTransaction Summary\n================================================================================\nInstall 1 Package\n\nTotal download size: 1.4 M\nInstalled size: 4.7 M\nDownloading packages:\nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Installing : libreswan-3.25-9.1.el7_8.x86_64 1/1 \n Verifying : libreswan-3.25-9.1.el7_8.x86_64 1/1 \n\nInstalled:\n libreswan.x86_64 0:3.25-9.1.el7_8 \n\nComplete!\n" ] } lsrpackages: iproute libreswan TASK [fedora.linux_system_roles.vpn : Configure firewall] ********************** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:13 Friday 12 July 2024 09:58:08 +0000 (0:00:02.738) 0:00:05.418 *********** included: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/firewall.yml for sut TASK [Ensure the vpn ports status with the firewall role] ********************** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/firewall.yml:3 Friday 12 July 2024 09:58:08 +0000 (0:00:00.019) 0:00:05.438 *********** skipping: [sut] => { "changed": false, "false_condition": "vpn_manage_firewall | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Configure selinux] *********************** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:16 Friday 12 July 2024 09:58:08 +0000 (0:00:00.027) 0:00:05.465 *********** included: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml for sut TASK [fedora.linux_system_roles.vpn : Populate service facts] ****************** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:3 Friday 12 July 2024 09:58:08 +0000 (0:00:00.024) 0:00:05.489 *********** ok: [sut] => { "ansible_facts": { "services": { "NetworkManager-dispatcher.service": { "name": "NetworkManager-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "NetworkManager-wait-online.service": { "name": "NetworkManager-wait-online.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "NetworkManager.service": { "name": "NetworkManager.service", "source": "systemd", "state": "running", "status": "enabled" }, "arp-ethers.service": { "name": "arp-ethers.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "auditd.service": { "name": "auditd.service", "source": "systemd", "state": "running", "status": "enabled" }, "auth-rpcgss-module.service": { "name": "auth-rpcgss-module.service", "source": "systemd", "state": "stopped", "status": "static" }, "autovt@.service": { "name": "autovt@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "blk-availability.service": { "name": "blk-availability.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "brandbot.service": { "name": "brandbot.service", "source": "systemd", "state": "inactive", "status": "static" }, "chrony-dnssrv@.service": { "name": "chrony-dnssrv@.service", "source": "systemd", "state": "unknown", "status": "static" }, "chrony-wait.service": { "name": "chrony-wait.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "chronyd.service": { "name": "chronyd.service", "source": "systemd", "state": "running", "status": "enabled" }, "cloud-config.service": { "name": "cloud-config.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-final.service": { "name": "cloud-final.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init-local.service": { "name": "cloud-init-local.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init.service": { "name": "cloud-init.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "console-getty.service": { "name": "console-getty.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "console-shell.service": { "name": "console-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "container-getty@.service": { "name": "container-getty@.service", "source": "systemd", "state": "unknown", "status": "static" }, "cpupower.service": { "name": "cpupower.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "crond.service": { "name": "crond.service", "source": "systemd", "state": "running", "status": "enabled" }, "dbus-org.freedesktop.hostname1.service": { "name": "dbus-org.freedesktop.hostname1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.import1.service": { "name": "dbus-org.freedesktop.import1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.locale1.service": { "name": "dbus-org.freedesktop.locale1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.login1.service": { "name": "dbus-org.freedesktop.login1.service", "source": "systemd", "state": "active", "status": "static" }, "dbus-org.freedesktop.machine1.service": { "name": "dbus-org.freedesktop.machine1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.nm-dispatcher.service": { "name": "dbus-org.freedesktop.nm-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus-org.freedesktop.timedate1.service": { "name": "dbus-org.freedesktop.timedate1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus.service": { "name": "dbus.service", "source": "systemd", "state": "running", "status": "static" }, "debug-shell.service": { "name": "debug-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "display-manager.service": { "name": "display-manager.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "dracut-cmdline.service": { "name": "dracut-cmdline.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-initqueue.service": { "name": "dracut-initqueue.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-mount.service": { "name": "dracut-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-mount.service": { "name": "dracut-pre-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-pivot.service": { "name": "dracut-pre-pivot.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-trigger.service": { "name": "dracut-pre-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-udev.service": { "name": "dracut-pre-udev.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown.service": { "name": "dracut-shutdown.service", "source": "systemd", "state": "stopped", "status": "static" }, "ebtables.service": { "name": "ebtables.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "emergency.service": { "name": "emergency.service", "source": "systemd", "state": "stopped", "status": "static" }, "exim.service": { "name": "exim.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "firewalld.service": { "name": "firewalld.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "fstrim.service": { "name": "fstrim.service", "source": "systemd", "state": "inactive", "status": "static" }, "getty@.service": { "name": "getty@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "getty@tty1.service": { "name": "getty@tty1.service", "source": "systemd", "state": "running", "status": "active" }, "gssproxy.service": { "name": "gssproxy.service", "source": "systemd", "state": "running", "status": "disabled" }, "halt-local.service": { "name": "halt-local.service", "source": "systemd", "state": "inactive", "status": "static" }, "initrd-cleanup.service": { "name": "initrd-cleanup.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-parse-etc.service": { "name": "initrd-parse-etc.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-switch-root.service": { "name": "initrd-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-udevadm-cleanup-db.service": { "name": "initrd-udevadm-cleanup-db.service", "source": "systemd", "state": "stopped", "status": "static" }, "ip6tables.service": { "name": "ip6tables.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "iprdump.service": { "name": "iprdump.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprinit.service": { "name": "iprinit.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprupdate.service": { "name": "iprupdate.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ipsec.service": { "name": "ipsec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iptables.service": { "name": "iptables.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "irqbalance.service": { "name": "irqbalance.service", "source": "systemd", "state": "running", "status": "enabled" }, "kdump.service": { "name": "kdump.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "kmod-static-nodes.service": { "name": "kmod-static-nodes.service", "source": "systemd", "state": "stopped", "status": "static" }, "messagebus.service": { "name": "messagebus.service", "source": "systemd", "state": "active", "status": "static" }, "microcode.service": { "name": "microcode.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "netconsole": { "name": "netconsole", "source": "sysv", "state": "stopped", "status": "disabled" }, "network": { "name": "network", "source": "sysv", "state": "running", "status": "enabled" }, "network.service": { "name": "network.service", "source": "systemd", "state": "stopped", "status": "active" }, "nfs-blkmap.service": { "name": "nfs-blkmap.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-config.service": { "name": "nfs-config.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-idmap.service": { "name": "nfs-idmap.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-idmapd.service": { "name": "nfs-idmapd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-lock.service": { "name": "nfs-lock.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-mountd.service": { "name": "nfs-mountd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-rquotad.service": { "name": "nfs-rquotad.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-secure-server.service": { "name": "nfs-secure-server.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "nfs-secure.service": { "name": "nfs-secure.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-server.service": { "name": "nfs-server.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nfs-utils.service": { "name": "nfs-utils.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs.service": { "name": "nfs.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfslock.service": { "name": "nfslock.service", "source": "systemd", "state": "inactive", "status": "static" }, "ntpd.service": { "name": "ntpd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ntpdate.service": { "name": "ntpdate.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "plymouth-halt.service": { "name": "plymouth-halt.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-kexec.service": { "name": "plymouth-kexec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-poweroff.service": { "name": "plymouth-poweroff.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-quit-wait.service": { "name": "plymouth-quit-wait.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-quit.service": { "name": "plymouth-quit.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-read-write.service": { "name": "plymouth-read-write.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-reboot.service": { "name": "plymouth-reboot.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-start.service": { "name": "plymouth-start.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-switch-root.service": { "name": "plymouth-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "polkit.service": { "name": "polkit.service", "source": "systemd", "state": "running", "status": "static" }, "postfix.service": { "name": "postfix.service", "source": "systemd", "state": "running", "status": "enabled" }, "qemu-guest-agent.service": { "name": "qemu-guest-agent.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "quotaon.service": { "name": "quotaon.service", "source": "systemd", "state": "inactive", "status": "static" }, "rc-local.service": { "name": "rc-local.service", "source": "systemd", "state": "stopped", "status": "static" }, "rdisc.service": { "name": "rdisc.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rescue.service": { "name": "rescue.service", "source": "systemd", "state": "stopped", "status": "static" }, "restraintd.service": { "name": "restraintd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rhel-autorelabel-mark.service": { "name": "rhel-autorelabel-mark.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-autorelabel.service": { "name": "rhel-autorelabel.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-configure.service": { "name": "rhel-configure.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-dmesg.service": { "name": "rhel-dmesg.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-domainname.service": { "name": "rhel-domainname.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-import-state.service": { "name": "rhel-import-state.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-loadmodules.service": { "name": "rhel-loadmodules.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-readonly.service": { "name": "rhel-readonly.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rngd.service": { "name": "rngd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpc-gssd.service": { "name": "rpc-gssd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-rquotad.service": { "name": "rpc-rquotad.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rpc-statd-notify.service": { "name": "rpc-statd-notify.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd.service": { "name": "rpc-statd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpcbind.service": { "name": "rpcbind.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpcgssd.service": { "name": "rpcgssd.service", "source": "systemd", "state": "inactive", "status": "static" }, "rpcidmapd.service": { "name": "rpcidmapd.service", "source": "systemd", "state": "inactive", "status": "static" }, "rsyncd.service": { "name": "rsyncd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rsyncd@.service": { "name": "rsyncd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "rsyslog.service": { "name": "rsyslog.service", "source": "systemd", "state": "running", "status": "enabled" }, "selinux-policy-migrate-local-changes@.service": { "name": "selinux-policy-migrate-local-changes@.service", "source": "systemd", "state": "unknown", "status": "static" }, "selinux-policy-migrate-local-changes@targeted.service": { "name": "selinux-policy-migrate-local-changes@targeted.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sendmail.service": { "name": "sendmail.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "serial-getty@.service": { "name": "serial-getty@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "serial-getty@ttyS0.service": { "name": "serial-getty@ttyS0.service", "source": "systemd", "state": "running", "status": "active" }, "sntp.service": { "name": "sntp.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sshd-keygen.service": { "name": "sshd-keygen.service", "source": "systemd", "state": "stopped", "status": "static" }, "sshd.service": { "name": "sshd.service", "source": "systemd", "state": "running", "status": "enabled" }, "sshd@.service": { "name": "sshd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "syslog.service": { "name": "syslog.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-ask-password-console.service": { "name": "systemd-ask-password-console.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-plymouth.service": { "name": "systemd-ask-password-plymouth.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-wall.service": { "name": "systemd-ask-password-wall.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-backlight@.service": { "name": "systemd-backlight@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-binfmt.service": { "name": "systemd-binfmt.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-bootchart.service": { "name": "systemd-bootchart.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-firstboot.service": { "name": "systemd-firstboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck-root.service": { "name": "systemd-fsck-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck@.service": { "name": "systemd-fsck@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-halt.service": { "name": "systemd-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hibernate-resume@.service": { "name": "systemd-hibernate-resume@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-hibernate.service": { "name": "systemd-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hostnamed.service": { "name": "systemd-hostnamed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hwdb-update.service": { "name": "systemd-hwdb-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-hybrid-sleep.service": { "name": "systemd-hybrid-sleep.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-importd.service": { "name": "systemd-importd.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-initctl.service": { "name": "systemd-initctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-catalog-update.service": { "name": "systemd-journal-catalog-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-flush.service": { "name": "systemd-journal-flush.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journald.service": { "name": "systemd-journald.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-kexec.service": { "name": "systemd-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-localed.service": { "name": "systemd-localed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-logind.service": { "name": "systemd-logind.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-machine-id-commit.service": { "name": "systemd-machine-id-commit.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-machined.service": { "name": "systemd-machined.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-modules-load.service": { "name": "systemd-modules-load.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-nspawn@.service": { "name": "systemd-nspawn@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "systemd-poweroff.service": { "name": "systemd-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-quotacheck.service": { "name": "systemd-quotacheck.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-random-seed.service": { "name": "systemd-random-seed.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-readahead-collect.service": { "name": "systemd-readahead-collect.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-readahead-done.service": { "name": "systemd-readahead-done.service", "source": "systemd", "state": "stopped", "status": "indirect" }, "systemd-readahead-drop.service": { "name": "systemd-readahead-drop.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "systemd-readahead-replay.service": { "name": "systemd-readahead-replay.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-reboot.service": { "name": "systemd-reboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-remount-fs.service": { "name": "systemd-remount-fs.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-rfkill@.service": { "name": "systemd-rfkill@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-shutdownd.service": { "name": "systemd-shutdownd.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-suspend.service": { "name": "systemd-suspend.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-sysctl.service": { "name": "systemd-sysctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-sysusers.service": { "name": "systemd-sysusers.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-timedated.service": { "name": "systemd-timedated.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-timesyncd.service": { "name": "systemd-timesyncd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-tmpfiles-clean.service": { "name": "systemd-tmpfiles-clean.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup-dev.service": { "name": "systemd-tmpfiles-setup-dev.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup.service": { "name": "systemd-tmpfiles-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-settle.service": { "name": "systemd-udev-settle.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-udev-trigger.service": { "name": "systemd-udev-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udevd.service": { "name": "systemd-udevd.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-update-done.service": { "name": "systemd-update-done.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp-runlevel.service": { "name": "systemd-update-utmp-runlevel.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp.service": { "name": "systemd-update-utmp.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-user-sessions.service": { "name": "systemd-user-sessions.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-vconsole-setup.service": { "name": "systemd-vconsole-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "teamd@.service": { "name": "teamd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "tuned.service": { "name": "tuned.service", "source": "systemd", "state": "running", "status": "enabled" }, "unbound-anchor.service": { "name": "unbound-anchor.service", "source": "systemd", "state": "stopped", "status": "static" }, "wpa_supplicant.service": { "name": "wpa_supplicant.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ypbind.service": { "name": "ypbind.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "yppasswdd.service": { "name": "yppasswdd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ypserv.service": { "name": "ypserv.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ypxfrd.service": { "name": "ypxfrd.service", "source": "systemd", "state": "stopped", "status": "not-found" } } }, "changed": false } TASK [fedora.linux_system_roles.vpn : Get the ipsec tcp service ports] ********* task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:12 Friday 12 July 2024 09:58:09 +0000 (0:00:01.017) 0:00:06.507 *********** skipping: [sut] => { "changed": false, "false_condition": "ansible_facts.services[\"firewalld.service\"][\"state\"] == \"running\"", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Initialize _vpn_selinux] ***************** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:20 Friday 12 July 2024 09:58:09 +0000 (0:00:00.021) 0:00:06.529 *********** skipping: [sut] => { "changed": false, "false_condition": "ansible_facts.services[\"firewalld.service\"][\"state\"] == \"running\"", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Add the ipsec service ports to _vpn_selinux] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:24 Friday 12 July 2024 09:58:09 +0000 (0:00:00.019) 0:00:06.548 *********** skipping: [sut] => { "changed": false, "false_condition": "ansible_facts.services[\"firewalld.service\"][\"state\"] == \"running\"", "skip_reason": "Conditional result was False" } TASK [Ensure the service and the ports status with the selinux role] *********** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:31 Friday 12 July 2024 09:58:09 +0000 (0:00:00.019) 0:00:06.568 *********** skipping: [sut] => { "changed": false, "false_condition": "ansible_facts.services[\"firewalld.service\"][\"state\"] == \"running\"", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Ensure OpenSSL is installed on the controller] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:26 Friday 12 July 2024 09:58:09 +0000 (0:00:00.020) 0:00:06.589 *********** skipping: [sut] => { "changed": false, "false_condition": "not \"/usr/bin/openssl\" is exists", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Enforce default auth method as needed] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:34 Friday 12 July 2024 09:58:09 +0000 (0:00:00.036) 0:00:06.626 *********** ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "psk", "hosts": { "host01.local": "", "host02.local": "", "host03.local": { "hostname": "169.254.1.1" }, "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [fedora.linux_system_roles.vpn : Make sure that the hosts list is not empty] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:44 Friday 12 July 2024 09:58:09 +0000 (0:00:00.039) 0:00:06.666 *********** skipping: [sut] => { "changed": false, "false_condition": "\"True\" in failure", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Make sure there is at least one pair of hosts in each connection] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:59 Friday 12 July 2024 09:58:09 +0000 (0:00:00.040) 0:00:06.706 *********** ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "psk", "hosts": { "host01.local": "", "host02.local": "", "host03.local": { "hostname": "169.254.1.1" }, "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [fedora.linux_system_roles.vpn : Ensure cert_names are populated when auth_method is cert] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:73 Friday 12 July 2024 09:58:09 +0000 (0:00:00.040) 0:00:06.747 *********** skipping: [sut] => { "changed": false, "false_condition": "\"True\" in failure", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Generate PSKs or use provided shared_key_content] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:100 Friday 12 July 2024 09:58:09 +0000 (0:00:00.051) 0:00:06.799 *********** ok: [sut -> localhost] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [fedora.linux_system_roles.vpn : Set psks for hosts] ********************** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:137 Friday 12 July 2024 09:58:09 +0000 (0:00:00.103) 0:00:06.902 *********** ok: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [fedora.linux_system_roles.vpn : Create ipsec.conf files] ***************** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:161 Friday 12 July 2024 09:58:09 +0000 (0:00:00.105) 0:00:07.007 *********** changed: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": true, "checksum": "78a1d7236da3707e0b7f02430bf6d4ef3b8a2979", "dest": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "gid": 0, "group": "root", "item": "host01.local", "md5sum": "6b703aa3e10b3cac8b0824183ddbd145", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 200, "src": "/root/.ansible/tmp/ansible-tmp-1720778289.737046-1286-128570614544074/source", "state": "file", "uid": 0 } changed: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": true, "checksum": "a2a7152e77793b5be71e8914343021a6c58a00e2", "dest": "/etc/ipsec.d/mainhost.local-to-host02.local.conf", "gid": 0, "group": "root", "item": "host02.local", "md5sum": "fb7cc3e35a1a9944f91921c85a2a2243", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 200, "src": "/root/.ansible/tmp/ansible-tmp-1720778290.4815493-1286-4753090925244/source", "state": "file", "uid": 0 } changed: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": true, "checksum": "8d28b6d894189a46e522731d038b186e5bac9247", "dest": "/etc/ipsec.d/mainhost.local-to-sut.conf", "gid": 0, "group": "root", "item": "sut", "md5sum": "568f91ff188f6f866681e306fab2b940", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 199, "src": "/root/.ansible/tmp/ansible-tmp-1720778291.2718449-1286-19157035169623/source", "state": "file", "uid": 0 } changed: [sut] => (item=host03.local) => { "ansible_loop_var": "item", "changed": true, "checksum": "b651f28c3c1e6d70f6a544c481b952c4a4ed1917", "dest": "/etc/ipsec.d/mainhost.local-to-host03.local.conf", "gid": 0, "group": "root", "item": "host03.local", "md5sum": "d2560885bb5ba3829155f72d8d5531fa", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 196, "src": "/root/.ansible/tmp/ansible-tmp-1720778292.097008-1286-143586349837086/source", "state": "file", "uid": 0 } Notification for handler __vpn_handler_enable_start_vpn has been saved. Notification for handler __vpn_handler_enable_start_vpn has been saved. Notification for handler __vpn_handler_enable_start_vpn has been saved. Notification for handler __vpn_handler_enable_start_vpn has been saved. TASK [fedora.linux_system_roles.vpn : Check if secrets file already exists] **** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:169 Friday 12 July 2024 09:58:12 +0000 (0:00:03.169) 0:00:10.177 *********** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "exists": false } } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "item": "host02.local", "stat": { "exists": false } } ok: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": false, "item": "sut", "stat": { "exists": false } } ok: [sut] => (item=host03.local) => { "ansible_loop_var": "item", "changed": false, "item": "host03.local", "stat": { "exists": false } } TASK [fedora.linux_system_roles.vpn : Create ipsec.secrets files] ************** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:175 Friday 12 July 2024 09:58:13 +0000 (0:00:00.723) 0:00:10.901 *********** changed: [sut] => (item={'invocation': {'module_args': {'checksum_algorithm': 'sha1', 'get_checksum': True, 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'follow': False, 'get_mime': True, 'get_attributes': True}}, 'stat': {'exists': False}, 'changed': False, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "01ff75b2279eb7877ee12201d627abf7e8f7eae6", "dest": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "stat": { "exists": false } }, "md5sum": "a849f2d865da73cccca99b47eca8e05c", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 144, "src": "/root/.ansible/tmp/ansible-tmp-1720778293.6122859-1359-189792104521633/source", "state": "file", "uid": 0 } changed: [sut] => (item={'invocation': {'module_args': {'checksum_algorithm': 'sha1', 'get_checksum': True, 'path': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets', 'follow': False, 'get_mime': True, 'get_attributes': True}}, 'stat': {'exists': False}, 'changed': False, 'failed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "b9e51660250a5b7b3d9dcdfcb2326e32d965cbe5", "dest": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" } }, "item": "host02.local", "stat": { "exists": false } }, "md5sum": "f4b83f233d235602ec880f9d320e01a3", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 144, "src": "/root/.ansible/tmp/ansible-tmp-1720778294.4341722-1359-5475164925967/source", "state": "file", "uid": 0 } changed: [sut] => (item={'invocation': {'module_args': {'checksum_algorithm': 'sha1', 'get_checksum': True, 'path': '/etc/ipsec.d/mainhost.local-to-sut.secrets', 'follow': False, 'get_mime': True, 'get_attributes': True}}, 'stat': {'exists': False}, 'changed': False, 'failed': False, 'item': 'sut', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "b199d478b4bbd6aae3b0a92a66b6817b6d2d1325", "dest": "/etc/ipsec.d/mainhost.local-to-sut.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-sut.secrets" } }, "item": "sut", "stat": { "exists": false } }, "md5sum": "42c4580fd4c696204c043d995c40ae5b", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 143, "src": "/root/.ansible/tmp/ansible-tmp-1720778295.340534-1359-179819187026546/source", "state": "file", "uid": 0 } changed: [sut] => (item={'invocation': {'module_args': {'checksum_algorithm': 'sha1', 'get_checksum': True, 'path': '/etc/ipsec.d/mainhost.local-to-host03.local.secrets', 'follow': False, 'get_mime': True, 'get_attributes': True}}, 'stat': {'exists': False}, 'changed': False, 'failed': False, 'item': 'host03.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "be531d6c3465891d314830d66f27e08105b3165a", "dest": "/etc/ipsec.d/mainhost.local-to-host03.local.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host03.local.secrets" } }, "item": "host03.local", "stat": { "exists": false } }, "md5sum": "1022809386f13396a4c3959908dff5a8", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 142, "src": "/root/.ansible/tmp/ansible-tmp-1720778296.2186522-1359-230954991096099/source", "state": "file", "uid": 0 } Notification for handler __vpn_handler_enable_start_vpn has been saved. Notification for handler __vpn_handler_enable_start_vpn has been saved. Notification for handler __vpn_handler_enable_start_vpn has been saved. Notification for handler __vpn_handler_enable_start_vpn has been saved. TASK [fedora.linux_system_roles.vpn : Build opportunistic configuration] ******* task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:185 Friday 12 July 2024 09:58:16 +0000 (0:00:03.299) 0:00:14.200 *********** skipping: [sut] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } skipping: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [Stat unmanaged host conf file path] ************************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:29 Friday 12 July 2024 09:58:16 +0000 (0:00:00.039) 0:00:14.240 *********** ok: [sut] => { "changed": false, "stat": { "atime": 1720778292.7332423, "attr_flags": "e", "attributes": [ "extents" ], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "b651f28c3c1e6d70f6a544c481b952c4a4ed1917", "ctime": 1720778292.7372422, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 262706, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1720778292.5152493, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host03.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 196, "uid": 0, "version": "754592816", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Assert existence of unmanaged host conf file] **************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:34 Friday 12 July 2024 09:58:17 +0000 (0:00:00.191) 0:00:14.432 *********** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Stat unmanaged host secrets file path] *********************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:39 Friday 12 July 2024 09:58:17 +0000 (0:00:00.024) 0:00:14.456 *********** ok: [sut] => { "changed": false, "stat": { "atime": 1720778296.7671134, "attr_flags": "e", "attributes": [ "extents" ], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "be531d6c3465891d314830d66f27e08105b3165a", "ctime": 1720778296.7721133, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 262710, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1720778296.5041218, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host03.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 142, "uid": 0, "version": "754592861", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Assert existence of unmanaged host secrets file] ************************* task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:44 Friday 12 July 2024 09:58:17 +0000 (0:00:00.198) 0:00:14.655 *********** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Reset success flag] ****************************************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:49 Friday 12 July 2024 09:58:17 +0000 (0:00:00.018) 0:00:14.673 *********** ok: [sut] => { "ansible_facts": { "__vpn_success": true }, "changed": false } TASK [Get and store conf file for unmanaged host] ****************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:53 Friday 12 July 2024 09:58:17 +0000 (0:00:00.015) 0:00:14.689 *********** ok: [sut] => { "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpjb25uIG1haW5ob3N0LmxvY2FsLXRvLTE2OS4yNTQuMS4xCiAgbGVmdD1tYWluaG9zdC5sb2NhbAogIGxlZnRpZD1AbWFpbmhvc3QubG9jYWwKICByaWdodD0xNjkuMjU0LjEuMQogIHJpZ2h0aWQ9MTY5LjI1NC4xLjEKICBpa2V2Mj1pbnNpc3QKICBhdXRoYnk9c2VjcmV0Cg==", "encoding": "base64", "source": "/etc/ipsec.d/mainhost.local-to-host03.local.conf" } TASK [Check that unmanaged host conf file contains correct information] ******** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:58 Friday 12 July 2024 09:58:17 +0000 (0:00:00.288) 0:00:14.977 *********** skipping: [sut] => { "changed": false, "false_condition": "__vpn_register_unmanaged_conf.content | b64decode is not search('left=' + __vpn_main_hostname) or __vpn_register_unmanaged_conf.content | b64decode is not search('leftid=@' + __vpn_main_hostname) or __vpn_register_unmanaged_conf.content | b64decode is not search('right=' + __vpn_unmanaged_hostname) or __vpn_register_unmanaged_conf.content | b64decode is not search('rightid=' + __vpn_unmanaged_hostname)", "skip_reason": "Conditional result was False" } TASK [Assert success for unmanaged host conf file] ***************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:71 Friday 12 July 2024 09:58:17 +0000 (0:00:00.036) 0:00:15.014 *********** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get and store unmanaged host secrets files] ****************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:76 Friday 12 July 2024 09:58:17 +0000 (0:00:00.032) 0:00:15.046 *********** ok: [sut] => { "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpAbWFpbmhvc3QubG9jYWwgMTY5LjI1NC4xLjEgOiBQU0sgInFpMDlCUGdhejZTb1VvWlRDeXp2R2N1TGM4K2l6KzRLTURFUEhNN1N4aFB1b0NFOWhQd2NMZ0xOUWtDSlMwbEIiCg==", "encoding": "base64", "source": "/etc/ipsec.d/mainhost.local-to-host03.local.secrets" } TASK [Check that secrets file contains correct information] ******************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:81 Friday 12 July 2024 09:58:17 +0000 (0:00:00.174) 0:00:15.221 *********** skipping: [sut] => { "changed": false, "false_condition": "__vpn_register_unmanaged_secrets.content | b64decode | regex_search('^@' + __vpn_main_hostname + ' ' + __vpn_unmanaged_hostname + ' : PSK *', multiline=True) | d() | length == 0", "skip_reason": "Conditional result was False" } TASK [Assert success for unmanaged host secrets files] ************************* task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:90 Friday 12 July 2024 09:58:17 +0000 (0:00:00.040) 0:00:15.261 *********** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Check the firewall and the selinux port status] ************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:95 Friday 12 July 2024 09:58:17 +0000 (0:00:00.033) 0:00:15.295 *********** included: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/check_firewall_selinux.yml for sut TASK [Get firewall service] **************************************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/check_firewall_selinux.yml:9 Friday 12 July 2024 09:58:17 +0000 (0:00:00.031) 0:00:15.326 *********** skipping: [sut] => { "changed": false, "false_condition": "vpn_manage_firewall or vpn_manage_selinux", "skip_reason": "Conditional result was False" } TASK [Ensure 'ipsec' is in the firewalld service list] ************************* task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/check_firewall_selinux.yml:14 Friday 12 July 2024 09:58:17 +0000 (0:00:00.022) 0:00:15.349 *********** skipping: [sut] => { "changed": false, "false_condition": "vpn_manage_firewall or vpn_manage_selinux", "skip_reason": "Conditional result was False" } TASK [Get associated selinux ports] ******************************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/check_firewall_selinux.yml:19 Friday 12 July 2024 09:58:18 +0000 (0:00:00.017) 0:00:15.366 *********** skipping: [sut] => { "changed": false, "false_condition": "vpn_manage_firewall or vpn_manage_selinux", "skip_reason": "Conditional result was False" } TASK [Check associated selinux ports when vpn_manage_selinux is true] ********** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/check_firewall_selinux.yml:27 Friday 12 July 2024 09:58:18 +0000 (0:00:00.017) 0:00:15.383 *********** skipping: [sut] => { "changed": false, "false_condition": "vpn_manage_firewall or vpn_manage_selinux", "skip_reason": "Conditional result was False" } TASK [Cleanup] ***************************************************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:98 Friday 12 July 2024 09:58:18 +0000 (0:00:00.018) 0:00:15.402 *********** included: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/cleanup.yml for sut TASK [Set platform/version specific variables] ********************************* task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/cleanup.yml:2 Friday 12 July 2024 09:58:18 +0000 (0:00:00.050) 0:00:15.453 *********** TASK [fedora.linux_system_roles.vpn : Ensure ansible_facts used by role] ******* task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 Friday 12 July 2024 09:58:18 +0000 (0:00:00.036) 0:00:15.489 *********** skipping: [sut] => { "changed": false, "false_condition": "__vpn_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Check if system is ostree] *************** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:10 Friday 12 July 2024 09:58:18 +0000 (0:00:00.035) 0:00:15.525 *********** skipping: [sut] => { "changed": false, "false_condition": "not __vpn_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:15 Friday 12 July 2024 09:58:18 +0000 (0:00:00.021) 0:00:15.547 *********** skipping: [sut] => { "changed": false, "false_condition": "not __vpn_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:19 Friday 12 July 2024 09:58:18 +0000 (0:00:00.023) 0:00:15.570 *********** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "CentOS.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=CentOS_7.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/CentOS_7.yml" ], "ansible_loop_var": "item", "changed": false, "item": "CentOS_7.yml" } skipping: [sut] => (item=CentOS_7.9.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "CentOS_7.9.yml", "skip_reason": "Conditional result was False" } TASK [Get service facts] ******************************************************* task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/cleanup.yml:8 Friday 12 July 2024 09:58:18 +0000 (0:00:00.051) 0:00:15.621 *********** ok: [sut] => { "ansible_facts": { "services": { "NetworkManager-dispatcher.service": { "name": "NetworkManager-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "NetworkManager-wait-online.service": { "name": "NetworkManager-wait-online.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "NetworkManager.service": { "name": "NetworkManager.service", "source": "systemd", "state": "running", "status": "enabled" }, "arp-ethers.service": { "name": "arp-ethers.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "auditd.service": { "name": "auditd.service", "source": "systemd", "state": "running", "status": "enabled" }, "auth-rpcgss-module.service": { "name": "auth-rpcgss-module.service", "source": "systemd", "state": "stopped", "status": "static" }, "autovt@.service": { "name": "autovt@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "blk-availability.service": { "name": "blk-availability.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "brandbot.service": { "name": "brandbot.service", "source": "systemd", "state": "inactive", "status": "static" }, "chrony-dnssrv@.service": { "name": "chrony-dnssrv@.service", "source": "systemd", "state": "unknown", "status": "static" }, "chrony-wait.service": { "name": "chrony-wait.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "chronyd.service": { "name": "chronyd.service", "source": "systemd", "state": "running", "status": "enabled" }, "cloud-config.service": { "name": "cloud-config.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-final.service": { "name": "cloud-final.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init-local.service": { "name": "cloud-init-local.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init.service": { "name": "cloud-init.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "console-getty.service": { "name": "console-getty.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "console-shell.service": { "name": "console-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "container-getty@.service": { "name": "container-getty@.service", "source": "systemd", "state": "unknown", "status": "static" }, "cpupower.service": { "name": "cpupower.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "crond.service": { "name": "crond.service", "source": "systemd", "state": "running", "status": "enabled" }, "dbus-org.freedesktop.hostname1.service": { "name": "dbus-org.freedesktop.hostname1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.import1.service": { "name": "dbus-org.freedesktop.import1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.locale1.service": { "name": "dbus-org.freedesktop.locale1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.login1.service": { "name": "dbus-org.freedesktop.login1.service", "source": "systemd", "state": "active", "status": "static" }, "dbus-org.freedesktop.machine1.service": { "name": "dbus-org.freedesktop.machine1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.nm-dispatcher.service": { "name": "dbus-org.freedesktop.nm-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus-org.freedesktop.timedate1.service": { "name": "dbus-org.freedesktop.timedate1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus.service": { "name": "dbus.service", "source": "systemd", "state": "running", "status": "static" }, "debug-shell.service": { "name": "debug-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "display-manager.service": { "name": "display-manager.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "dracut-cmdline.service": { "name": "dracut-cmdline.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-initqueue.service": { "name": "dracut-initqueue.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-mount.service": { "name": "dracut-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-mount.service": { "name": "dracut-pre-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-pivot.service": { "name": "dracut-pre-pivot.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-trigger.service": { "name": "dracut-pre-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-udev.service": { "name": "dracut-pre-udev.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown.service": { "name": "dracut-shutdown.service", "source": "systemd", "state": "stopped", "status": "static" }, "ebtables.service": { "name": "ebtables.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "emergency.service": { "name": "emergency.service", "source": "systemd", "state": "stopped", "status": "static" }, "exim.service": { "name": "exim.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "firewalld.service": { "name": "firewalld.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "fstrim.service": { "name": "fstrim.service", "source": "systemd", "state": "inactive", "status": "static" }, "getty@.service": { "name": "getty@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "getty@tty1.service": { "name": "getty@tty1.service", "source": "systemd", "state": "running", "status": "active" }, "gssproxy.service": { "name": "gssproxy.service", "source": "systemd", "state": "running", "status": "disabled" }, "halt-local.service": { "name": "halt-local.service", "source": "systemd", "state": "inactive", "status": "static" }, "initrd-cleanup.service": { "name": "initrd-cleanup.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-parse-etc.service": { "name": "initrd-parse-etc.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-switch-root.service": { "name": "initrd-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-udevadm-cleanup-db.service": { "name": "initrd-udevadm-cleanup-db.service", "source": "systemd", "state": "stopped", "status": "static" }, "ip6tables.service": { "name": "ip6tables.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "iprdump.service": { "name": "iprdump.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprinit.service": { "name": "iprinit.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprupdate.service": { "name": "iprupdate.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ipsec.service": { "name": "ipsec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iptables.service": { "name": "iptables.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "irqbalance.service": { "name": "irqbalance.service", "source": "systemd", "state": "running", "status": "enabled" }, "kdump.service": { "name": "kdump.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "kmod-static-nodes.service": { "name": "kmod-static-nodes.service", "source": "systemd", "state": "stopped", "status": "static" }, "messagebus.service": { "name": "messagebus.service", "source": "systemd", "state": "active", "status": "static" }, "microcode.service": { "name": "microcode.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "netconsole": { "name": "netconsole", "source": "sysv", "state": "stopped", "status": "disabled" }, "network": { "name": "network", "source": "sysv", "state": "running", "status": "enabled" }, "network.service": { "name": "network.service", "source": "systemd", "state": "stopped", "status": "active" }, "nfs-blkmap.service": { "name": "nfs-blkmap.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-config.service": { "name": "nfs-config.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-idmap.service": { "name": "nfs-idmap.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-idmapd.service": { "name": "nfs-idmapd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-lock.service": { "name": "nfs-lock.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-mountd.service": { "name": "nfs-mountd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-rquotad.service": { "name": "nfs-rquotad.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-secure-server.service": { "name": "nfs-secure-server.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "nfs-secure.service": { "name": "nfs-secure.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-server.service": { "name": "nfs-server.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nfs-utils.service": { "name": "nfs-utils.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs.service": { "name": "nfs.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfslock.service": { "name": "nfslock.service", "source": "systemd", "state": "inactive", "status": "static" }, "ntpd.service": { "name": "ntpd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ntpdate.service": { "name": "ntpdate.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "plymouth-halt.service": { "name": "plymouth-halt.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-kexec.service": { "name": "plymouth-kexec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-poweroff.service": { "name": "plymouth-poweroff.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-quit-wait.service": { "name": "plymouth-quit-wait.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-quit.service": { "name": "plymouth-quit.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-read-write.service": { "name": "plymouth-read-write.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-reboot.service": { "name": "plymouth-reboot.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-start.service": { "name": "plymouth-start.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-switch-root.service": { "name": "plymouth-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "polkit.service": { "name": "polkit.service", "source": "systemd", "state": "running", "status": "static" }, "postfix.service": { "name": "postfix.service", "source": "systemd", "state": "running", "status": "enabled" }, "qemu-guest-agent.service": { "name": "qemu-guest-agent.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "quotaon.service": { "name": "quotaon.service", "source": "systemd", "state": "inactive", "status": "static" }, "rc-local.service": { "name": "rc-local.service", "source": "systemd", "state": "stopped", "status": "static" }, "rdisc.service": { "name": "rdisc.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rescue.service": { "name": "rescue.service", "source": "systemd", "state": "stopped", "status": "static" }, "restraintd.service": { "name": "restraintd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rhel-autorelabel-mark.service": { "name": "rhel-autorelabel-mark.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-autorelabel.service": { "name": "rhel-autorelabel.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-configure.service": { "name": "rhel-configure.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-dmesg.service": { "name": "rhel-dmesg.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-domainname.service": { "name": "rhel-domainname.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-import-state.service": { "name": "rhel-import-state.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-loadmodules.service": { "name": "rhel-loadmodules.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-readonly.service": { "name": "rhel-readonly.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rngd.service": { "name": "rngd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpc-gssd.service": { "name": "rpc-gssd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-rquotad.service": { "name": "rpc-rquotad.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rpc-statd-notify.service": { "name": "rpc-statd-notify.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd.service": { "name": "rpc-statd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpcbind.service": { "name": "rpcbind.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpcgssd.service": { "name": "rpcgssd.service", "source": "systemd", "state": "inactive", "status": "static" }, "rpcidmapd.service": { "name": "rpcidmapd.service", "source": "systemd", "state": "inactive", "status": "static" }, "rsyncd.service": { "name": "rsyncd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rsyncd@.service": { "name": "rsyncd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "rsyslog.service": { "name": "rsyslog.service", "source": "systemd", "state": "running", "status": "enabled" }, "selinux-policy-migrate-local-changes@.service": { "name": "selinux-policy-migrate-local-changes@.service", "source": "systemd", "state": "unknown", "status": "static" }, "selinux-policy-migrate-local-changes@targeted.service": { "name": "selinux-policy-migrate-local-changes@targeted.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sendmail.service": { "name": "sendmail.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "serial-getty@.service": { "name": "serial-getty@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "serial-getty@ttyS0.service": { "name": "serial-getty@ttyS0.service", "source": "systemd", "state": "running", "status": "active" }, "sntp.service": { "name": "sntp.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sshd-keygen.service": { "name": "sshd-keygen.service", "source": "systemd", "state": "stopped", "status": "static" }, "sshd.service": { "name": "sshd.service", "source": "systemd", "state": "running", "status": "enabled" }, "sshd@.service": { "name": "sshd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "syslog.service": { "name": "syslog.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-ask-password-console.service": { "name": "systemd-ask-password-console.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-plymouth.service": { "name": "systemd-ask-password-plymouth.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-wall.service": { "name": "systemd-ask-password-wall.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-backlight@.service": { "name": "systemd-backlight@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-binfmt.service": { "name": "systemd-binfmt.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-bootchart.service": { "name": "systemd-bootchart.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-firstboot.service": { "name": "systemd-firstboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck-root.service": { "name": "systemd-fsck-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck@.service": { "name": "systemd-fsck@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-halt.service": { "name": "systemd-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hibernate-resume@.service": { "name": "systemd-hibernate-resume@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-hibernate.service": { "name": "systemd-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hostnamed.service": { "name": "systemd-hostnamed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hwdb-update.service": { "name": "systemd-hwdb-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-hybrid-sleep.service": { "name": "systemd-hybrid-sleep.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-importd.service": { "name": "systemd-importd.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-initctl.service": { "name": "systemd-initctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-catalog-update.service": { "name": "systemd-journal-catalog-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-flush.service": { "name": "systemd-journal-flush.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journald.service": { "name": "systemd-journald.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-kexec.service": { "name": "systemd-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-localed.service": { "name": "systemd-localed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-logind.service": { "name": "systemd-logind.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-machine-id-commit.service": { "name": "systemd-machine-id-commit.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-machined.service": { "name": "systemd-machined.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-modules-load.service": { "name": "systemd-modules-load.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-nspawn@.service": { "name": "systemd-nspawn@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "systemd-poweroff.service": { "name": "systemd-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-quotacheck.service": { "name": "systemd-quotacheck.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-random-seed.service": { "name": "systemd-random-seed.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-readahead-collect.service": { "name": "systemd-readahead-collect.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-readahead-done.service": { "name": "systemd-readahead-done.service", "source": "systemd", "state": "stopped", "status": "indirect" }, "systemd-readahead-drop.service": { "name": "systemd-readahead-drop.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "systemd-readahead-replay.service": { "name": "systemd-readahead-replay.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-reboot.service": { "name": "systemd-reboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-remount-fs.service": { "name": "systemd-remount-fs.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-rfkill@.service": { "name": "systemd-rfkill@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-shutdownd.service": { "name": "systemd-shutdownd.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-suspend.service": { "name": "systemd-suspend.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-sysctl.service": { "name": "systemd-sysctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-sysusers.service": { "name": "systemd-sysusers.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-timedated.service": { "name": "systemd-timedated.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-timesyncd.service": { "name": "systemd-timesyncd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-tmpfiles-clean.service": { "name": "systemd-tmpfiles-clean.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup-dev.service": { "name": "systemd-tmpfiles-setup-dev.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup.service": { "name": "systemd-tmpfiles-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-settle.service": { "name": "systemd-udev-settle.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-udev-trigger.service": { "name": "systemd-udev-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udevd.service": { "name": "systemd-udevd.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-update-done.service": { "name": "systemd-update-done.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp-runlevel.service": { "name": "systemd-update-utmp-runlevel.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp.service": { "name": "systemd-update-utmp.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-user-sessions.service": { "name": "systemd-user-sessions.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-vconsole-setup.service": { "name": "systemd-vconsole-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "teamd@.service": { "name": "teamd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "tuned.service": { "name": "tuned.service", "source": "systemd", "state": "running", "status": "enabled" }, "unbound-anchor.service": { "name": "unbound-anchor.service", "source": "systemd", "state": "stopped", "status": "static" }, "wpa_supplicant.service": { "name": "wpa_supplicant.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ypbind.service": { "name": "ypbind.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "yppasswdd.service": { "name": "yppasswdd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ypserv.service": { "name": "ypserv.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ypxfrd.service": { "name": "ypxfrd.service", "source": "systemd", "state": "stopped", "status": "not-found" } } }, "changed": false } TASK [Stop ipsec service] ****************************************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/cleanup.yml:11 Friday 12 July 2024 09:58:19 +0000 (0:00:00.874) 0:00:16.496 *********** ok: [sut] => { "changed": false, "enabled": false, "name": "ipsec", "state": "stopped", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "systemd-journald.socket network-online.target basic.target system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "shutdown.target", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "Internet Key Exchange (IKE) Protocol Daemon for IPsec", "DevicePolicy": "auto", "Documentation": "man:ipsec(8) man:pluto(8) man:ipsec.conf(5)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/usr/libexec/ipsec/whack ; argv[]=/usr/libexec/ipsec/whack --listen ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/libexec/ipsec/pluto ; argv[]=/usr/libexec/ipsec/pluto --leak-detective --config /etc/ipsec.conf --nofork ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/usr/sbin/ipsec ; argv[]=/usr/sbin/ipsec --checknflog ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStop": "{ path=/usr/libexec/ipsec/whack ; argv[]=/usr/libexec/ipsec/whack --shutdown ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStopPost": "{ path=/usr/sbin/ipsec ; argv[]=/usr/sbin/ipsec --stopnflog ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/ipsec.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "ipsec.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "ipsec.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "all", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "always", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "notify", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "disabled", "Wants": "network-online.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "3min 20s" } } TASK [Uninstall packages] ****************************************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/cleanup.yml:18 Friday 12 July 2024 09:58:19 +0000 (0:00:00.259) 0:00:16.756 *********** changed: [sut] => (item=libreswan) => { "ansible_loop_var": "item", "changed": true, "changes": { "removed": [ "libreswan" ] }, "item": "libreswan", "rc": 0, "results": [ "Loaded plugins: fastestmirror\nResolving Dependencies\n--> Running transaction check\n---> Package libreswan.x86_64 0:3.25-9.1.el7_8 will be erased\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nRemoving:\n libreswan x86_64 3.25-9.1.el7_8 @updates 4.7 M\n\nTransaction Summary\n================================================================================\nRemove 1 Package\n\nInstalled size: 4.7 M\nDownloading packages:\nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Erasing : libreswan-3.25-9.1.el7_8.x86_64 1/1 \n Verifying : libreswan-3.25-9.1.el7_8.x86_64 1/1 \n\nRemoved:\n libreswan.x86_64 0:3.25-9.1.el7_8 \n\nComplete!\n" ] } TASK [Remove ipsec.conf files] ************************************************* task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/cleanup.yml:43 Friday 12 July 2024 09:58:21 +0000 (0:00:01.687) 0:00:18.443 *********** changed: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": true, "item": "host01.local", "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "state": "absent" } changed: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": true, "item": "host02.local", "path": "/etc/ipsec.d/mainhost.local-to-host02.local.conf", "state": "absent" } changed: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": true, "item": "sut", "path": "/etc/ipsec.d/mainhost.local-to-sut.conf", "state": "absent" } changed: [sut] => (item=host03.local) => { "ansible_loop_var": "item", "changed": true, "item": "host03.local", "path": "/etc/ipsec.d/mainhost.local-to-host03.local.conf", "state": "absent" } TASK [Remove ipsec.secrets files] ********************************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/cleanup.yml:49 Friday 12 July 2024 09:58:21 +0000 (0:00:00.768) 0:00:19.212 *********** changed: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": true, "item": "host01.local", "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "state": "absent" } changed: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": true, "item": "host02.local", "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets", "state": "absent" } changed: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": true, "item": "sut", "path": "/etc/ipsec.d/mainhost.local-to-sut.secrets", "state": "absent" } changed: [sut] => (item=host03.local) => { "ansible_loop_var": "item", "changed": true, "item": "host03.local", "path": "/etc/ipsec.d/mainhost.local-to-host03.local.secrets", "state": "absent" } TASK [Stop firewall] *********************************************************** task path: /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/cleanup.yml:55 Friday 12 July 2024 09:58:22 +0000 (0:00:00.864) 0:00:20.076 *********** skipping: [sut] => { "changed": false, "false_condition": "vpn_manage_firewall | bool", "skip_reason": "Conditional result was False" } NOTIFIED HANDLER fedora.linux_system_roles.vpn : Restart vpn service and wait for ssh conn to return for sut RUNNING HANDLER [fedora.linux_system_roles.vpn : Restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/handlers/main.yml:2 Friday 12 July 2024 09:58:22 +0000 (0:00:00.040) 0:00:20.116 *********** included: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [fedora.linux_system_roles.vpn : Enable and restart vpn services] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 Friday 12 July 2024 09:58:22 +0000 (0:00:00.022) 0:00:20.139 *********** changed: [sut] => (item=ipsec) => { "ansible_job_id": "j528746020419.11160", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/j528746020419.11160", "started": 1 } RUNNING HANDLER [fedora.linux_system_roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 Friday 12 July 2024 09:58:23 +0000 (0:00:00.868) 0:00:21.007 *********** ok: [sut] => { "changed": false, "elapsed": 3 } PLAY RECAP ********************************************************************* sut : ok=47 changed=10 unreachable=0 failed=0 skipped=27 rescued=0 ignored=0 Friday 12 July 2024 09:58:27 +0000 (0:00:03.833) 0:00:24.841 *********** =============================================================================== fedora.linux_system_roles.vpn : Wait for ssh connection to return ------- 3.83s /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 fedora.linux_system_roles.vpn : Create ipsec.secrets files -------------- 3.30s /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:175 fedora.linux_system_roles.vpn : Create ipsec.conf files ----------------- 3.17s /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:161 fedora.linux_system_roles.vpn : Ensure required packages are installed --- 2.74s /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:6 Uninstall packages ------------------------------------------------------ 1.69s /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/cleanup.yml:18 --------------------- fedora.linux_system_roles.vpn : Populate service facts ------------------ 1.02s /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:3 Get service facts ------------------------------------------------------- 0.87s /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/cleanup.yml:8 ---------------------- fedora.linux_system_roles.vpn : Enable and restart vpn services --------- 0.87s /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 Remove ipsec.secrets files ---------------------------------------------- 0.86s /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/cleanup.yml:49 --------------------- Gathering Facts --------------------------------------------------------- 0.78s /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:3 ------- Remove ipsec.conf files ------------------------------------------------- 0.77s /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/cleanup.yml:43 --------------------- fedora.linux_system_roles.vpn : Check if secrets file already exists ---- 0.72s /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:169 Ensure firewalld not running if not testing firewall -------------------- 0.50s /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:67 ------------------ Get and store conf file for unmanaged host ------------------------------ 0.29s /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:53 ------ Create nss directory for testing ---------------------------------------- 0.28s /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:22 ------------------ Stop ipsec service ------------------------------------------------------ 0.26s /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/cleanup.yml:11 --------------------- fedora.linux_system_roles.vpn : Check if system is ostree --------------- 0.26s /WORKDIR/git-weekly-ci7ke6dew7/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:10 Stat unmanaged host secrets file path ----------------------------------- 0.20s /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:39 ------ Stat unmanaged host conf file path -------------------------------------- 0.19s /WORKDIR/git-weekly-ci7ke6dew7/tests/tests_host_to_unmanaged_host.yml:29 ------ Create /etc/ipsec.d directory for testing ------------------------------- 0.18s /WORKDIR/git-weekly-ci7ke6dew7/tests/tasks/setup_test.yml:28 ------------------ ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- [DEPRECATION WARNING]: ANSIBLE_COLLECTIONS_PATHS option, does not fit var naming standard, use the singular form ANSIBLE_COLLECTIONS_PATH instead. This feature will be removed from ansible-core in version 2.19. Deprecation warnings can be disabled by setting deprecation_warnings=False in ansible.cfg. ---^---^---^---^---^---