# STDOUT: ---v---v---v---v---v--- ansible-playbook 2.9.27 config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.9/lib/python3.9/site-packages/ansible executable location = /opt/ansible-2.9/bin/ansible-playbook python version = 3.9.18 (main, Sep 7 2023, 00:00:00) [GCC 11.4.1 20230605 (Red Hat 11.4.1-2)] Using /etc/ansible/ansible.cfg as config file Skipping callback 'actionable', as we already have a stdout callback. Skipping callback 'counter_enabled', as we already have a stdout callback. Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'full_skip', as we already have a stdout callback. Skipping callback 'json', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'null', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. Skipping callback 'selective', as we already have a stdout callback. Skipping callback 'skippy', as we already have a stdout callback. Skipping callback 'stderr', as we already have a stdout callback. Skipping callback 'unixy', as we already have a stdout callback. Skipping callback 'yaml', as we already have a stdout callback. PLAYBOOK: tests_reboot.yml ***************************************************** 1 plays in /WORKDIR/git-weekly-cik7vflidc/tests/tests_reboot.yml PLAY [Ensure we can set crypto policy including reboot of the system] ********** TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/git-weekly-cik7vflidc/tests/tests_reboot.yml:3 Saturday 09 December 2023 04:43:58 +0000 (0:00:00.013) 0:00:00.013 ***** ok: [sut] META: ran handlers TASK [Ensure we can set crypto policy including reboot of the system] ********** task path: /WORKDIR/git-weekly-cik7vflidc/tests/tests_reboot.yml:11 Saturday 09 December 2023 04:43:59 +0000 (0:00:00.906) 0:00:00.919 ***** TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:3 Saturday 09 December 2023 04:43:59 +0000 (0:00:00.027) 0:00:00.947 ***** included: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml for sut TASK [linux-system-roles.crypto_policies : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:2 Saturday 09 December 2023 04:43:59 +0000 (0:00:00.016) 0:00:00.963 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:11 Saturday 09 December 2023 04:43:59 +0000 (0:00:00.019) 0:00:00.983 ***** ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [linux-system-roles.crypto_policies : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:16 Saturday 09 December 2023 04:44:00 +0000 (0:00:00.278) 0:00:01.262 ***** ok: [sut] => { "ansible_facts": { "__crypto_policies_is_ostree": false }, "changed": false } TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:20 Saturday 09 December 2023 04:44:00 +0000 (0:00:00.020) 0:00:01.282 ***** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=Fedora.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=Fedora_38.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora_38.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=Fedora_38.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora_38.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Ensure required packages are installed] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 Saturday 09 December 2023 04:44:00 +0000 (0:00:00.030) 0:00:01.313 ***** ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do lsrpackages: crypto-policies crypto-policies-scripts TASK [linux-system-roles.crypto_policies : Gather facts] *********************** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:13 Saturday 09 December 2023 04:44:02 +0000 (0:00:02.613) 0:00:03.926 ***** included: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 09 December 2023 04:44:02 +0000 (0:00:00.014) 0:00:03.941 ***** ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.063622", "end": "2023-12-09 04:44:03.229681", "rc": 0, "start": "2023-12-09 04:44:03.166059" } STDOUT: DEFAULT TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 09 December 2023 04:44:03 +0000 (0:00:00.342) 0:00:04.283 ***** ok: [sut] => { "ansible_facts": { "crypto_policies_active": "DEFAULT" }, "changed": false } TASK [linux-system-roles.crypto_policies : Find base policies files] *********** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:16 Saturday 09 December 2023 04:44:03 +0000 (0:00:00.018) 0:00:04.302 ***** ok: [sut] => { "changed": false, "examined": 11, "files": [ { "atime": 1677628800.0, "ctime": 1701778517.366, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149810, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/EMPTY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 267, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.366, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149815, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/LEGACY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 3013, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.366, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149816, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/NEXT.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2998, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.366, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149811, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FEDORA38.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2998, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1701778587.5, "ctime": 1701778517.366, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149809, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/DEFAULT.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2998, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.366, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149812, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FIPS.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2149, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.366, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149817, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/TEST-FEDORA39.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2757, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.366, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149813, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FUTURE.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2688, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.366, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149814, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/GOST-ONLY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 936, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 9 } TASK [linux-system-roles.crypto_policies : Set available base policies fact] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:24 Saturday 09 December 2023 04:44:03 +0000 (0:00:00.270) 0:00:04.573 ***** ok: [sut] => { "ansible_facts": { "crypto_policies_available_policies": [ "NEXT", "FIPS", "TEST-FEDORA39", "LEGACY", "FUTURE", "EMPTY", "FEDORA38", "DEFAULT", "GOST-ONLY" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Find subpolicy files] *************** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:31 Saturday 09 December 2023 04:44:03 +0000 (0:00:00.022) 0:00:04.595 ***** ok: [sut] => { "changed": false, "examined": 8, "files": [ { "atime": 1677628800.0, "ctime": 1701778517.366, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149819, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/AD-SUPPORT.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 331, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.367, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149826, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/SHA1.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 131, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.367, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149821, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/FEDORA32.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 398, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.366, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149820, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/ECDHE-ONLY.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 136, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.367, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149824, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-SHA1.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 288, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.367, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149823, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-CAMELLIA.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 93, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.367, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149825, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/OSPP.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 1986, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1677628800.0, "ctime": 1701778517.367, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 149822, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1677628800.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/GOST.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 789, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 8 } TASK [linux-system-roles.crypto_policies : Set available subpolicies fact] ***** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:39 Saturday 09 December 2023 04:44:03 +0000 (0:00:00.212) 0:00:04.808 ***** ok: [sut] => { "ansible_facts": { "crypto_policies_available_subpolicies": [ "OSPP", "AD-SUPPORT", "SHA1", "GOST", "FEDORA32", "NO-CAMELLIA", "ECDHE-ONLY", "NO-SHA1" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Set crypto_policies_available_modules fact (deprecated)] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:46 Saturday 09 December 2023 04:44:03 +0000 (0:00:00.037) 0:00:04.846 ***** ok: [sut] => { "ansible_facts": { "crypto_policies_available_modules": [ "OSPP", "AD-SUPPORT", "SHA1", "GOST", "FEDORA32", "NO-CAMELLIA", "ECDHE-ONLY", "NO-SHA1" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Update crypto policy if needed] ***** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:52 Saturday 09 December 2023 04:44:03 +0000 (0:00:00.054) 0:00:04.900 ***** NOTIFIED HANDLER linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes for sut NOTIFIED HANDLER linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag for sut changed: [sut] => { "changed": true, "cmd": [ "update-crypto-policies", "--set", "FUTURE" ], "delta": "0:00:00.219456", "end": "2023-12-09 04:44:04.308027", "rc": 0, "start": "2023-12-09 04:44:04.088571" } STDOUT: Setting system policy to FUTURE Note: System-wide crypto policies are applied on application start-up. It is recommended to restart the system for the change of policies to fully take place. TASK [linux-system-roles.crypto_policies : Set the reboot_required flag if needed] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:64 Saturday 09 December 2023 04:44:04 +0000 (0:00:00.461) 0:00:05.362 ***** ok: [sut] => { "ansible_facts": { "crypto_policies_reboot_required": true }, "changed": false } TASK [linux-system-roles.crypto_policies : Update facts after applying policy] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:72 Saturday 09 December 2023 04:44:04 +0000 (0:00:00.032) 0:00:05.395 ***** included: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 09 December 2023 04:44:04 +0000 (0:00:00.016) 0:00:05.411 ***** ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.062462", "end": "2023-12-09 04:44:04.616271", "rc": 0, "start": "2023-12-09 04:44:04.553809" } STDOUT: FUTURE TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 09 December 2023 04:44:04 +0000 (0:00:00.265) 0:00:05.677 ***** ok: [sut] => { "ansible_facts": { "crypto_policies_active": "FUTURE" }, "changed": false } RUNNING HANDLER [linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:4 Saturday 09 December 2023 04:44:04 +0000 (0:00:00.026) 0:00:05.704 ***** fatal: [sut]: FAILED! => { "changed": false, "elapsed": 611, "rebooted": true } MSG: Timed out waiting for last boot time check (timeout=600) RUNNING HANDLER [linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:11 Saturday 09 December 2023 04:54:16 +0000 (0:10:11.820) 0:10:17.524 ***** META: ran handlers TASK [Restore policy to DEFAULT] *********************************************** task path: /WORKDIR/git-weekly-cik7vflidc/tests/tests_reboot.yml:29 Saturday 09 December 2023 04:54:16 +0000 (0:00:00.002) 0:10:17.526 ***** TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:3 Saturday 09 December 2023 04:54:16 +0000 (0:00:00.018) 0:10:17.545 ***** included: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml for sut TASK [linux-system-roles.crypto_policies : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:2 Saturday 09 December 2023 04:54:16 +0000 (0:00:00.012) 0:10:17.557 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:11 Saturday 09 December 2023 04:54:16 +0000 (0:00:00.019) 0:10:17.576 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:16 Saturday 09 December 2023 04:54:16 +0000 (0:00:00.018) 0:10:17.595 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:20 Saturday 09 December 2023 04:54:16 +0000 (0:00:00.019) 0:10:17.614 ***** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=Fedora.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=Fedora_38.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora_38.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=Fedora_38.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora_38.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Ensure required packages are installed] *** task path: /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 Saturday 09 December 2023 04:54:16 +0000 (0:00:00.029) 0:10:17.644 ***** fatal: [sut]: UNREACHABLE! => { "changed": false, "unreachable": true } MSG: Data could not be sent to remote host "10.31.14.19". Make sure this host can be reached over ssh: Warning: Permanently added '10.31.14.19' (ED25519) to the list of known hosts. root@10.31.14.19: Permission denied (publickey,gssapi-keyex,gssapi-with-mic,password). to retry, use: --limit @/tmp/tests_reboot.retry PLAY RECAP ********************************************************************* sut : ok=19 changed=1 unreachable=1 failed=1 skipped=6 rescued=0 ignored=0 Saturday 09 December 2023 04:54:16 +0000 (0:00:00.226) 0:10:17.871 ***** =============================================================================== linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes - 611.82s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:4 linux-system-roles.crypto_policies : Ensure required packages are installed --- 2.61s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 Gathering Facts --------------------------------------------------------- 0.91s /WORKDIR/git-weekly-cik7vflidc/tests/tests_reboot.yml:3 ----------------------- linux-system-roles.crypto_policies : Update crypto policy if needed ----- 0.46s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:52 linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.34s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Check if system is ostree ---------- 0.28s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:11 linux-system-roles.crypto_policies : Find base policies files ----------- 0.27s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:16 linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.27s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Ensure required packages are installed --- 0.23s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 linux-system-roles.crypto_policies : Find subpolicy files --------------- 0.21s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:31 linux-system-roles.crypto_policies : Set crypto_policies_available_modules fact (deprecated) --- 0.05s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:46 linux-system-roles.crypto_policies : Set available subpolicies fact ----- 0.04s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:39 linux-system-roles.crypto_policies : Set the reboot_required flag if needed --- 0.03s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:64 linux-system-roles.crypto_policies : Set platform/version specific variables --- 0.03s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:20 linux-system-roles.crypto_policies : Set platform/version specific variables --- 0.03s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:20 Ensure we can set crypto policy including reboot of the system ---------- 0.03s /WORKDIR/git-weekly-cik7vflidc/tests/tests_reboot.yml:11 ---------------------- linux-system-roles.crypto_policies : Set current policy fact ------------ 0.03s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 linux-system-roles.crypto_policies : Set available base policies fact --- 0.02s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:24 linux-system-roles.crypto_policies : Set flag to indicate system is ostree --- 0.02s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:16 linux-system-roles.crypto_policies : Ensure ansible_facts used by role --- 0.02s /WORKDIR/git-weekly-cik7vflidc/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:2 ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- ---^---^---^---^---^---