# STDOUT: ---v---v---v---v---v--- ansible-playbook 2.9.27 config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.9/lib/python3.9/site-packages/ansible executable location = /opt/ansible-2.9/bin/ansible-playbook python version = 3.9.18 (main, Sep 7 2023, 00:00:00) [GCC 11.4.1 20230605 (Red Hat 11.4.1-2)] Using /etc/ansible/ansible.cfg as config file Skipping callback 'actionable', as we already have a stdout callback. Skipping callback 'counter_enabled', as we already have a stdout callback. Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'full_skip', as we already have a stdout callback. Skipping callback 'json', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'null', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. Skipping callback 'selective', as we already have a stdout callback. Skipping callback 'skippy', as we already have a stdout callback. Skipping callback 'stderr', as we already have a stdout callback. Skipping callback 'unixy', as we already have a stdout callback. Skipping callback 'yaml', as we already have a stdout callback. PLAYBOOK: tests_zone.yml ******************************************************* 1 plays in /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml PLAY [Test firewalld zones] **************************************************** TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:2 Saturday 02 December 2023 05:56:08 +0000 (0:00:00.020) 0:00:00.020 ***** ok: [sut] META: ran handlers TASK [Verify used firewalld zones] ********************************************* task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:15 Saturday 02 December 2023 05:56:09 +0000 (0:00:00.685) 0:00:00.705 ***** TASK [linux-system-roles.firewall : Setup firewalld] *************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:2 Saturday 02 December 2023 05:56:09 +0000 (0:00:00.065) 0:00:00.771 ***** included: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml for sut TASK [linux-system-roles.firewall : Ensure ansible_facts used by role] ********* task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:2 Saturday 02 December 2023 05:56:09 +0000 (0:00:00.042) 0:00:00.814 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Check if system is ostree] ***************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:11 Saturday 02 December 2023 05:56:09 +0000 (0:00:00.033) 0:00:00.848 ***** ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [linux-system-roles.firewall : Set flag to indicate system is ostree] ***** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:16 Saturday 02 December 2023 05:56:09 +0000 (0:00:00.235) 0:00:01.083 ***** ok: [sut] => { "ansible_facts": { "__firewall_is_ostree": false }, "changed": false } TASK [linux-system-roles.firewall : Install firewalld] ************************* task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:20 Saturday 02 December 2023 05:56:09 +0000 (0:00:00.026) 0:00:01.110 ***** ok: [sut] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [linux-system-roles.firewall : Collect service facts] ********************* task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:5 Saturday 02 December 2023 05:56:09 +0000 (0:00:00.516) 0:00:01.626 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:9 Saturday 02 December 2023 05:56:10 +0000 (0:00:00.027) 0:00:01.654 ***** skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "item": "ufw", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Unmask firewalld service] ****************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:23 Saturday 02 December 2023 05:56:10 +0000 (0:00:00.043) 0:00:01.697 ***** ok: [sut] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Sat 2023-12-02 05:54:40 UTC", "ActiveEnterTimestampMonotonic": "429141212", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "system.slice dbus.service basic.target polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2023-12-02 05:54:39 UTC", "AssertTimestampMonotonic": "428712851", "Before": "shutdown.target network-pre.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2023-12-02 05:54:39 UTC", "ConditionTimestampMonotonic": "428712849", "Conflicts": "ebtables.service ipset.service ip6tables.service shutdown.target iptables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "4608", "ExecMainStartTimestamp": "Sat 2023-12-02 05:54:39 UTC", "ExecMainStartTimestampMonotonic": "428720497", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2023-12-02 05:54:39 UTC] ; stop_time=[n/a] ; pid=4608 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2023-12-02 05:54:39 UTC", "InactiveExitTimestampMonotonic": "428720544", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "4608", "MemoryAccounting": "no", "MemoryCurrent": "32284672", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "2", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2023-12-02 05:54:40 UTC", "WatchdogTimestampMonotonic": "429141155", "WatchdogUSec": "0" } } TASK [linux-system-roles.firewall : Enable and start firewalld service] ******** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:29 Saturday 02 December 2023 05:56:10 +0000 (0:00:00.401) 0:00:02.099 ***** ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Sat 2023-12-02 05:54:40 UTC", "ActiveEnterTimestampMonotonic": "429141212", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "system.slice dbus.service basic.target polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2023-12-02 05:54:39 UTC", "AssertTimestampMonotonic": "428712851", "Before": "shutdown.target network-pre.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2023-12-02 05:54:39 UTC", "ConditionTimestampMonotonic": "428712849", "Conflicts": "ebtables.service ipset.service ip6tables.service shutdown.target iptables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "4608", "ExecMainStartTimestamp": "Sat 2023-12-02 05:54:39 UTC", "ExecMainStartTimestampMonotonic": "428720497", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2023-12-02 05:54:39 UTC] ; stop_time=[n/a] ; pid=4608 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2023-12-02 05:54:39 UTC", "InactiveExitTimestampMonotonic": "428720544", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "4608", "MemoryAccounting": "no", "MemoryCurrent": "32284672", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "2", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2023-12-02 05:54:40 UTC", "WatchdogTimestampMonotonic": "429141155", "WatchdogUSec": "0" } } TASK [linux-system-roles.firewall : Check if previous replaced is defined] ***** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:35 Saturday 02 December 2023 05:56:10 +0000 (0:00:00.214) 0:00:02.313 ***** ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python2", "__firewall_report_changed": true }, "changed": false } TASK [linux-system-roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:48 Saturday 02 December 2023 05:56:10 +0000 (0:00:00.030) 0:00:02.344 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:60 Saturday 02 December 2023 05:56:10 +0000 (0:00:00.025) 0:00:02.369 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Configure firewall] ************************ task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:77 Saturday 02 December 2023 05:56:10 +0000 (0:00:00.024) 0:00:02.393 ***** ok: [sut] => (item={'zone': 'internal', 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "state": "enabled", "zone": "internal" } } ok: [sut] => (item={'zone': 'external', 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "state": "enabled", "zone": "external" } } ok: [sut] => (item={'zone': 'trusted', 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "state": "enabled", "zone": "trusted" } } TASK [linux-system-roles.firewall : Gather firewall config information] ******** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:129 Saturday 02 December 2023 05:56:11 +0000 (0:00:01.242) 0:00:03.635 ***** skipping: [sut] => (item={'zone': 'internal', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "state": "enabled", "zone": "internal" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'external', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "state": "enabled", "zone": "external" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'trusted', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "state": "enabled", "zone": "trusted" }, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Update firewalld_config fact] ************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:140 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.048) 0:00:03.684 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Gather firewall config if no arguments] **** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:149 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.030) 0:00:03.715 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Update firewalld_config fact] ************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:154 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.028) 0:00:03.743 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Get config files, checksums after] ********* task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:163 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.024) 0:00:03.768 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Calculate what has changed] **************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:173 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.024) 0:00:03.792 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Show diffs] ******************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:182 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.023) 0:00:03.816 ***** skipping: [sut] => {} TASK [Fail on missing zones] *************************************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:27 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.025) 0:00:03.841 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Setup firewalld] ********************************************************* task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:34 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.024) 0:00:03.866 ***** TASK [linux-system-roles.firewall : Setup firewalld] *************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:2 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.045) 0:00:03.912 ***** included: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml for sut TASK [linux-system-roles.firewall : Ensure ansible_facts used by role] ********* task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:2 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.029) 0:00:03.941 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Check if system is ostree] ***************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:11 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.029) 0:00:03.970 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Set flag to indicate system is ostree] ***** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:16 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.025) 0:00:03.996 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Install firewalld] ************************* task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:20 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.024) 0:00:04.021 ***** ok: [sut] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [linux-system-roles.firewall : Collect service facts] ********************* task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:5 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.397) 0:00:04.418 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:9 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.028) 0:00:04.447 ***** skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "item": "ufw", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Unmask firewalld service] ****************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:23 Saturday 02 December 2023 05:56:12 +0000 (0:00:00.044) 0:00:04.491 ***** ok: [sut] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Sat 2023-12-02 05:54:40 UTC", "ActiveEnterTimestampMonotonic": "429141212", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "system.slice dbus.service basic.target polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2023-12-02 05:54:39 UTC", "AssertTimestampMonotonic": "428712851", "Before": "shutdown.target network-pre.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2023-12-02 05:54:39 UTC", "ConditionTimestampMonotonic": "428712849", "Conflicts": "ebtables.service ipset.service ip6tables.service shutdown.target iptables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "4608", "ExecMainStartTimestamp": "Sat 2023-12-02 05:54:39 UTC", "ExecMainStartTimestampMonotonic": "428720497", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2023-12-02 05:54:39 UTC] ; stop_time=[n/a] ; pid=4608 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2023-12-02 05:54:39 UTC", "InactiveExitTimestampMonotonic": "428720544", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "4608", "MemoryAccounting": "no", "MemoryCurrent": "32284672", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "2", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2023-12-02 05:54:40 UTC", "WatchdogTimestampMonotonic": "429141155", "WatchdogUSec": "0" } } TASK [linux-system-roles.firewall : Enable and start firewalld service] ******** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:29 Saturday 02 December 2023 05:56:13 +0000 (0:00:00.213) 0:00:04.705 ***** ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Sat 2023-12-02 05:54:40 UTC", "ActiveEnterTimestampMonotonic": "429141212", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "system.slice dbus.service basic.target polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2023-12-02 05:54:39 UTC", "AssertTimestampMonotonic": "428712851", "Before": "shutdown.target network-pre.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2023-12-02 05:54:39 UTC", "ConditionTimestampMonotonic": "428712849", "Conflicts": "ebtables.service ipset.service ip6tables.service shutdown.target iptables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "4608", "ExecMainStartTimestamp": "Sat 2023-12-02 05:54:39 UTC", "ExecMainStartTimestampMonotonic": "428720497", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2023-12-02 05:54:39 UTC] ; stop_time=[n/a] ; pid=4608 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2023-12-02 05:54:39 UTC", "InactiveExitTimestampMonotonic": "428720544", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "4608", "MemoryAccounting": "no", "MemoryCurrent": "32284672", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "2", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2023-12-02 05:54:40 UTC", "WatchdogTimestampMonotonic": "429141155", "WatchdogUSec": "0" } } TASK [linux-system-roles.firewall : Check if previous replaced is defined] ***** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:35 Saturday 02 December 2023 05:56:13 +0000 (0:00:00.204) 0:00:04.909 ***** ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": true, "__firewall_python_cmd": "/usr/bin/python2", "__firewall_report_changed": true }, "changed": false } TASK [linux-system-roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:48 Saturday 02 December 2023 05:56:13 +0000 (0:00:00.028) 0:00:04.938 ***** ok: [sut] => { "changed": false, "rc": 0 } STDOUT: 65a9e4a0653b58f6808edcf6d432f6676485af237e73cb7adaabab4df3fac7bc /etc/firewalld/firewalld.conf STDERR: Shared connection to 10.31.44.157 closed. TASK [linux-system-roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:60 Saturday 02 December 2023 05:56:14 +0000 (0:00:00.864) 0:00:05.802 ***** ok: [sut] => { "ansible_facts": { "__firewall_report_changed": false }, "changed": false } TASK [linux-system-roles.firewall : Configure firewall] ************************ task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:77 Saturday 02 December 2023 05:56:14 +0000 (0:00:00.025) 0:00:05.828 ***** ok: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" } } ok: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" } } ok: [sut] => (item={'zone': 'customzone', 'permanent': True, 'state': 'present'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "permanent": true, "state": "present", "zone": "customzone" } } ok: [sut] => (item={'zone': 'customzone', 'permanent': True, 'masquerade': True, 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "masquerade": true, "permanent": true, "state": "enabled", "zone": "customzone" } } ok: [sut] => (item={'set_default_zone': 'dmz', 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "set_default_zone": "dmz", "state": "enabled" } } ok: [sut] => (item={'service': 'http', 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "service": "http", "state": "enabled" } } TASK [linux-system-roles.firewall : Gather firewall config information] ******** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:129 Saturday 02 December 2023 05:56:16 +0000 (0:00:02.656) 0:00:08.485 ***** skipping: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'customzone', 'permanent': True, 'state': 'present'}) => { "ansible_loop_var": "item", "changed": false, "item": { "permanent": true, "state": "present", "zone": "customzone" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'customzone', 'permanent': True, 'masquerade': True, 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "masquerade": true, "permanent": true, "state": "enabled", "zone": "customzone" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'set_default_zone': 'dmz', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "set_default_zone": "dmz", "state": "enabled" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'service': 'http', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "service": "http", "state": "enabled" }, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Update firewalld_config fact] ************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:140 Saturday 02 December 2023 05:56:16 +0000 (0:00:00.060) 0:00:08.546 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Gather firewall config if no arguments] **** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:149 Saturday 02 December 2023 05:56:16 +0000 (0:00:00.024) 0:00:08.570 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Update firewalld_config fact] ************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:154 Saturday 02 December 2023 05:56:16 +0000 (0:00:00.023) 0:00:08.594 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Get config files, checksums after] ********* task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:163 Saturday 02 December 2023 05:56:16 +0000 (0:00:00.024) 0:00:08.619 ***** ok: [sut] => { "changed": false, "rc": 0 } STDOUT: e2b071ca9b919b8fd60a4fe1e00e4f792ec2245359e8c48027020970791176d1 /etc/firewalld/zones/internal.xml 610e6e9bafe289c126adb751e772cd0224012f12738a8b8011454b1da8865c18 /etc/firewalld/zones/customzone.xml df2e066f9b8c0677c4887aa9a7032c4f94480408ff740036d98e648d11dd84c5 /etc/firewalld/zones/dmz.xml 958dce439fe299ce0b0fdb10c4c18412269fbab3f09660e4b210962728554953 /etc/firewalld/firewalld.conf STDERR: Shared connection to 10.31.44.157 closed. TASK [linux-system-roles.firewall : Calculate what has changed] **************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:173 Saturday 02 December 2023 05:56:17 +0000 (0:00:00.304) 0:00:08.923 ***** changed: [sut] => { "ansible_facts": { "firewall_lib_result": { "changed": true } }, "changed": true } TASK [linux-system-roles.firewall : Show diffs] ******************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:182 Saturday 02 December 2023 05:56:17 +0000 (0:00:00.029) 0:00:08.952 ***** skipping: [sut] => {} TASK [Fail if no changes are done] ********************************************* task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:64 Saturday 02 December 2023 05:56:17 +0000 (0:00:00.025) 0:00:08.978 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Setup firewalld again] *************************************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:71 Saturday 02 December 2023 05:56:17 +0000 (0:00:00.025) 0:00:09.003 ***** TASK [linux-system-roles.firewall : Setup firewalld] *************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:2 Saturday 02 December 2023 05:56:17 +0000 (0:00:00.046) 0:00:09.050 ***** included: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml for sut TASK [linux-system-roles.firewall : Ensure ansible_facts used by role] ********* task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:2 Saturday 02 December 2023 05:56:17 +0000 (0:00:00.033) 0:00:09.083 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Check if system is ostree] ***************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:11 Saturday 02 December 2023 05:56:17 +0000 (0:00:00.025) 0:00:09.108 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Set flag to indicate system is ostree] ***** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:16 Saturday 02 December 2023 05:56:17 +0000 (0:00:00.025) 0:00:09.134 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Install firewalld] ************************* task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:20 Saturday 02 December 2023 05:56:17 +0000 (0:00:00.025) 0:00:09.159 ***** ok: [sut] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [linux-system-roles.firewall : Collect service facts] ********************* task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:5 Saturday 02 December 2023 05:56:17 +0000 (0:00:00.397) 0:00:09.557 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:9 Saturday 02 December 2023 05:56:17 +0000 (0:00:00.024) 0:00:09.581 ***** skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "item": "ufw", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Unmask firewalld service] ****************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:23 Saturday 02 December 2023 05:56:17 +0000 (0:00:00.043) 0:00:09.624 ***** ok: [sut] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Sat 2023-12-02 05:54:40 UTC", "ActiveEnterTimestampMonotonic": "429141212", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "system.slice dbus.service basic.target polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2023-12-02 05:54:39 UTC", "AssertTimestampMonotonic": "428712851", "Before": "shutdown.target network-pre.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2023-12-02 05:54:39 UTC", "ConditionTimestampMonotonic": "428712849", "Conflicts": "ebtables.service ipset.service ip6tables.service shutdown.target iptables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "4608", "ExecMainStartTimestamp": "Sat 2023-12-02 05:54:39 UTC", "ExecMainStartTimestampMonotonic": "428720497", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2023-12-02 05:54:39 UTC] ; stop_time=[n/a] ; pid=4608 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2023-12-02 05:54:39 UTC", "InactiveExitTimestampMonotonic": "428720544", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "4608", "MemoryAccounting": "no", "MemoryCurrent": "32313344", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "2", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2023-12-02 05:54:40 UTC", "WatchdogTimestampMonotonic": "429141155", "WatchdogUSec": "0" } } TASK [linux-system-roles.firewall : Enable and start firewalld service] ******** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:29 Saturday 02 December 2023 05:56:18 +0000 (0:00:00.210) 0:00:09.835 ***** ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Sat 2023-12-02 05:54:40 UTC", "ActiveEnterTimestampMonotonic": "429141212", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "system.slice dbus.service basic.target polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2023-12-02 05:54:39 UTC", "AssertTimestampMonotonic": "428712851", "Before": "shutdown.target network-pre.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2023-12-02 05:54:39 UTC", "ConditionTimestampMonotonic": "428712849", "Conflicts": "ebtables.service ipset.service ip6tables.service shutdown.target iptables.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "4608", "ExecMainStartTimestamp": "Sat 2023-12-02 05:54:39 UTC", "ExecMainStartTimestampMonotonic": "428720497", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2023-12-02 05:54:39 UTC] ; stop_time=[n/a] ; pid=4608 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2023-12-02 05:54:39 UTC", "InactiveExitTimestampMonotonic": "428720544", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "4608", "MemoryAccounting": "no", "MemoryCurrent": "32313344", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "2", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2023-12-02 05:54:40 UTC", "WatchdogTimestampMonotonic": "429141155", "WatchdogUSec": "0" } } TASK [linux-system-roles.firewall : Check if previous replaced is defined] ***** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:35 Saturday 02 December 2023 05:56:18 +0000 (0:00:00.203) 0:00:10.039 ***** ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": true, "__firewall_python_cmd": "/usr/bin/python2", "__firewall_report_changed": true }, "changed": false } TASK [linux-system-roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:48 Saturday 02 December 2023 05:56:18 +0000 (0:00:00.031) 0:00:10.070 ***** ok: [sut] => { "changed": false, "rc": 0 } STDOUT: e2b071ca9b919b8fd60a4fe1e00e4f792ec2245359e8c48027020970791176d1 /etc/firewalld/zones/internal.xml 610e6e9bafe289c126adb751e772cd0224012f12738a8b8011454b1da8865c18 /etc/firewalld/zones/customzone.xml df2e066f9b8c0677c4887aa9a7032c4f94480408ff740036d98e648d11dd84c5 /etc/firewalld/zones/dmz.xml 958dce439fe299ce0b0fdb10c4c18412269fbab3f09660e4b210962728554953 /etc/firewalld/firewalld.conf STDERR: Shared connection to 10.31.44.157 closed. TASK [linux-system-roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:60 Saturday 02 December 2023 05:56:19 +0000 (0:00:00.863) 0:00:10.934 ***** ok: [sut] => { "ansible_facts": { "__firewall_report_changed": false }, "changed": false } TASK [linux-system-roles.firewall : Configure firewall] ************************ task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:77 Saturday 02 December 2023 05:56:19 +0000 (0:00:00.025) 0:00:10.960 ***** ok: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" } } ok: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" } } ok: [sut] => (item={'zone': 'customzone', 'permanent': True, 'state': 'present'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "permanent": true, "state": "present", "zone": "customzone" } } ok: [sut] => (item={'zone': 'customzone', 'permanent': True, 'masquerade': True, 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "masquerade": true, "permanent": true, "state": "enabled", "zone": "customzone" } } ok: [sut] => (item={'set_default_zone': 'dmz', 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "set_default_zone": "dmz", "state": "enabled" } } ok: [sut] => (item={'service': 'http', 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "service": "http", "state": "enabled" } } TASK [linux-system-roles.firewall : Gather firewall config information] ******** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:129 Saturday 02 December 2023 05:56:21 +0000 (0:00:02.639) 0:00:13.599 ***** skipping: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'customzone', 'permanent': True, 'state': 'present'}) => { "ansible_loop_var": "item", "changed": false, "item": { "permanent": true, "state": "present", "zone": "customzone" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'customzone', 'permanent': True, 'masquerade': True, 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "masquerade": true, "permanent": true, "state": "enabled", "zone": "customzone" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'set_default_zone': 'dmz', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "set_default_zone": "dmz", "state": "enabled" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'service': 'http', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "service": "http", "state": "enabled" }, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Update firewalld_config fact] ************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:140 Saturday 02 December 2023 05:56:22 +0000 (0:00:00.064) 0:00:13.664 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Gather firewall config if no arguments] **** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:149 Saturday 02 December 2023 05:56:22 +0000 (0:00:00.028) 0:00:13.692 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Update firewalld_config fact] ************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:154 Saturday 02 December 2023 05:56:22 +0000 (0:00:00.025) 0:00:13.717 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Get config files, checksums after] ********* task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:163 Saturday 02 December 2023 05:56:22 +0000 (0:00:00.026) 0:00:13.743 ***** ok: [sut] => { "changed": false, "rc": 0 } STDOUT: e2b071ca9b919b8fd60a4fe1e00e4f792ec2245359e8c48027020970791176d1 /etc/firewalld/zones/internal.xml 610e6e9bafe289c126adb751e772cd0224012f12738a8b8011454b1da8865c18 /etc/firewalld/zones/customzone.xml df2e066f9b8c0677c4887aa9a7032c4f94480408ff740036d98e648d11dd84c5 /etc/firewalld/zones/dmz.xml 958dce439fe299ce0b0fdb10c4c18412269fbab3f09660e4b210962728554953 /etc/firewalld/firewalld.conf STDERR: Shared connection to 10.31.44.157 closed. TASK [linux-system-roles.firewall : Calculate what has changed] **************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:173 Saturday 02 December 2023 05:56:22 +0000 (0:00:00.310) 0:00:14.054 ***** ok: [sut] => { "ansible_facts": { "firewall_lib_result": { "changed": false } }, "changed": false } TASK [linux-system-roles.firewall : Show diffs] ******************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:182 Saturday 02 December 2023 05:56:22 +0000 (0:00:00.032) 0:00:14.087 ***** skipping: [sut] => {} TASK [Fail on newly changes] *************************************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:101 Saturday 02 December 2023 05:56:22 +0000 (0:00:00.028) 0:00:14.115 ***** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Verify firewalld zone internal services] ********************************* task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:108 Saturday 02 December 2023 05:56:22 +0000 (0:00:00.025) 0:00:14.141 ***** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--permanent", "--zone=internal", "--list-services" ], "delta": "0:00:00.316290", "end": "2023-12-02 05:56:22.988059", "failed_when_result": false, "rc": 0, "start": "2023-12-02 05:56:22.671769" } STDOUT: dhcpv6-client ftp mdns samba-client ssh tftp TASK [Verify firewalld zone internal ports] ************************************ task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:116 Saturday 02 December 2023 05:56:23 +0000 (0:00:00.516) 0:00:14.657 ***** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--permanent", "--zone=internal", "--list-ports" ], "delta": "0:00:00.302534", "end": "2023-12-02 05:56:23.428828", "failed_when_result": false, "rc": 0, "start": "2023-12-02 05:56:23.126294" } STDOUT: 443/tcp 443/udp TASK [Verify firewalld zone internal forward ports] **************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:124 Saturday 02 December 2023 05:56:23 +0000 (0:00:00.440) 0:00:15.098 ***** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--permanent", "--zone=internal", "--list-forward-ports" ], "delta": "0:00:00.303824", "end": "2023-12-02 05:56:23.868538", "failed_when_result": false, "rc": 0, "start": "2023-12-02 05:56:23.564714" } STDOUT: port=447:proto=tcp:toport=:toaddr=1.2.3.4 port=448:proto=tcp:toport=:toaddr=1.2.3.5 TASK [Verify custom zone has masquerade added to it] *************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:134 Saturday 02 December 2023 05:56:23 +0000 (0:00:00.439) 0:00:15.537 ***** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--permanent", "--zone=customzone", "--query-masquerade" ], "delta": "0:00:00.302333", "end": "2023-12-02 05:56:24.307249", "failed_when_result": false, "rc": 0, "start": "2023-12-02 05:56:24.004916" } STDOUT: yes TASK [Verify custom zone has masquerade added to it] *************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:141 Saturday 02 December 2023 05:56:24 +0000 (0:00:00.438) 0:00:15.976 ***** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--get-default-zone" ], "delta": "0:00:00.293484", "end": "2023-12-02 05:56:24.735817", "failed_when_result": false, "rc": 0, "start": "2023-12-02 05:56:24.442333" } STDOUT: dmz TASK [Verify that service http has been added to the default zone dmz] ********* task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:148 Saturday 02 December 2023 05:56:24 +0000 (0:00:00.428) 0:00:16.405 ***** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--zone=dmz", "--query-service=http" ], "delta": "0:00:00.284921", "end": "2023-12-02 05:56:25.156317", "failed_when_result": false, "rc": 0, "start": "2023-12-02 05:56:24.871396" } STDOUT: yes TASK [Remove customzone zone] ************************************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:161 Saturday 02 December 2023 05:56:25 +0000 (0:00:00.420) 0:00:16.825 ***** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--permanent", "--delete-zone=customzone" ], "delta": "0:00:00.301534", "end": "2023-12-02 05:56:25.596574", "failed_when_result": false, "rc": 0, "start": "2023-12-02 05:56:25.295040" } STDOUT: success TASK [Reset to zone defaults] ************************************************** task path: /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:167 Saturday 02 December 2023 05:56:25 +0000 (0:00:00.440) 0:00:17.265 ***** ok: [sut] => { "changed": false, "cmd": "firewall-cmd --permanent --load-zone-defaults=internal\nfirewall-cmd --permanent --load-zone-defaults=external\nfirewall-cmd --permanent --load-zone-defaults=trusted\nfirewall-cmd --reload\n", "delta": "0:00:01.427896", "end": "2023-12-02 05:56:27.160479", "rc": 0, "start": "2023-12-02 05:56:25.732583" } STDOUT: success success STDERR: Error: NO_DEFAULTS: external Error: NO_DEFAULTS: trusted META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* sut : ok=37 changed=1 unreachable=0 failed=0 skipped=35 rescued=0 ignored=0 Saturday 02 December 2023 05:56:27 +0000 (0:00:01.559) 0:00:18.824 ***** =============================================================================== linux-system-roles.firewall : Configure firewall ------------------------ 5.30s /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:77 linux-system-roles.firewall : Get config files, checksums before and remove --- 1.73s /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:48 Reset to zone defaults -------------------------------------------------- 1.56s /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:167 ----------------------- linux-system-roles.firewall : Configure firewall ------------------------ 1.24s /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:77 Gathering Facts --------------------------------------------------------- 0.69s /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:2 ------------------------- linux-system-roles.firewall : Get config files, checksums after --------- 0.61s /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:163 Verify firewalld zone internal services --------------------------------- 0.52s /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:108 ----------------------- linux-system-roles.firewall : Install firewalld ------------------------- 0.52s /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:20 Verify firewalld zone internal ports ------------------------------------ 0.44s /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:116 ----------------------- Remove customzone zone -------------------------------------------------- 0.44s /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:161 ----------------------- Verify firewalld zone internal forward ports ---------------------------- 0.44s /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:124 ----------------------- Verify custom zone has masquerade added to it --------------------------- 0.44s /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:134 ----------------------- Verify custom zone has masquerade added to it --------------------------- 0.43s /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:141 ----------------------- linux-system-roles.firewall : Unmask firewalld service ------------------ 0.42s /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:23 Verify that service http has been added to the default zone dmz --------- 0.42s /WORKDIR/git-weekly-cii627uiqd/tests/tests_zone.yml:148 ----------------------- linux-system-roles.firewall : Enable and start firewalld service -------- 0.41s /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:29 linux-system-roles.firewall : Unmask firewalld service ------------------ 0.40s /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/main.yml:23 linux-system-roles.firewall : Install firewalld ------------------------- 0.40s /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:20 linux-system-roles.firewall : Install firewalld ------------------------- 0.40s /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:20 linux-system-roles.firewall : Check if system is ostree ----------------- 0.24s /WORKDIR/git-weekly-cii627uiqd/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:11 ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- ---^---^---^---^---^---