# STDOUT: ---v---v---v---v---v--- ansible-playbook [core 2.16.0] config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.16/lib/python3.11/site-packages/ansible ansible collection location = /WORKDIR/git-weekly-cifr_x6am_/.collection executable location = /opt/ansible-2.16/bin/ansible-playbook python version = 3.11.5 (main, Sep 7 2023, 00:00:00) [GCC 11.4.1 20230605 (Red Hat 11.4.1-2)] (/opt/ansible-2.16/bin/python) jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_host_to_host_psk_custom.yml ************************************ 1 plays in /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml PLAY [Test host to host tunnel with custom PSK] ******************************** TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:2 Sunday 28 January 2024 04:55:44 +0000 (0:00:00.012) 0:00:00.012 ******** ok: [sut] TASK [Set up test environment] ************************************************* task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:26 Sunday 28 January 2024 04:55:45 +0000 (0:00:00.796) 0:00:00.809 ******** included: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml for sut TASK [Set platform/version specific variables] ********************************* task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml:2 Sunday 28 January 2024 04:55:45 +0000 (0:00:00.014) 0:00:00.823 ******** TASK [fedora.linux_system_roles.vpn : Ensure ansible_facts used by role] ******* task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 Sunday 28 January 2024 04:55:45 +0000 (0:00:00.017) 0:00:00.840 ******** skipping: [sut] => { "changed": false, "false_condition": "__vpn_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Check if system is ostree] *************** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:10 Sunday 28 January 2024 04:55:45 +0000 (0:00:00.017) 0:00:00.857 ******** ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [fedora.linux_system_roles.vpn : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:15 Sunday 28 January 2024 04:55:45 +0000 (0:00:00.255) 0:00:01.112 ******** ok: [sut] => { "ansible_facts": { "__vpn_is_ostree": false }, "changed": false } TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:19 Sunday 28 January 2024 04:55:45 +0000 (0:00:00.013) 0:00:01.126 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "CentOS.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=CentOS_8.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/CentOS_8.yml" ], "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml" } ok: [sut] => (item=CentOS_8.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/CentOS_8.yml" ], "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml" } TASK [Change inventory_hostname] *********************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml:11 Sunday 28 January 2024 04:55:45 +0000 (0:00:00.026) 0:00:01.153 ******** ok: [sut] => { "ansible_facts": { "inventory_hostname": "mainhost.local" }, "changed": false } TASK [Add sample main host] **************************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml:18 Sunday 28 January 2024 04:55:45 +0000 (0:00:00.019) 0:00:01.172 ******** creating host via 'add_host': hostname=mainhost.local changed: [sut] => { "add_host": { "groups": [], "host_name": "mainhost.local", "host_vars": {} }, "changed": true } TASK [Create nss directory for testing] **************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml:22 Sunday 28 January 2024 04:55:45 +0000 (0:00:00.017) 0:00:01.190 ******** changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0 } TASK [Create /etc/ipsec.d directory for testing] ******************************* task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml:28 Sunday 28 January 2024 04:55:45 +0000 (0:00:00.264) 0:00:01.454 ******** ok: [sut] => { "changed": false, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0 } TASK [Dynamically add more hosts] ********************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml:34 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.203) 0:00:01.658 ******** included: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/add_hosts.yml for sut TASK [Dynamically add multiple hosts for testing] ****************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/add_hosts.yml:2 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.010) 0:00:01.668 ******** creating host via 'add_host': hostname=host01.local creating host via 'add_host': hostname=host02.local changed: [sut] => (item=1) => { "add_host": { "groups": [ "testing" ], "host_name": "host01.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 1 } changed: [sut] => (item=2) => { "add_host": { "groups": [ "testing" ], "host_name": "host02.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 2 } TASK [Create mock vpn_connections] ********************************************* task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/add_hosts.yml:11 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.024) 0:00:01.692 ******** ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "hosts": { "host01.local": "", "host02.local": "", "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [Create sample policies directory for testing] **************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml:40 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.011) 0:00:01.704 ******** skipping: [sut] => { "changed": false, "false_condition": "__vpn_opportunistic | d(false)", "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml:46 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.016) 0:00:01.721 ******** skipping: [sut] => { "changed": false, "false_condition": "__vpn_opportunistic | d(false)", "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml:52 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.016) 0:00:01.737 ******** skipping: [sut] => { "changed": false, "false_condition": "__vpn_opportunistic | d(false)", "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml:58 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.016) 0:00:01.753 ******** skipping: [sut] => { "changed": false, "false_condition": "__vpn_opportunistic | d(false)", "skip_reason": "Conditional result was False" } TASK [Ensure firewalld not running if not testing firewall] ******************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml:67 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.016) 0:00:01.769 ******** ok: [sut] => { "changed": false, "enabled": false, "failed_when_result": false, "name": "firewalld", "state": "stopped", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "dbus.socket system.slice basic.target dbus.service sysinit.target polkit.service", "AllowIsolate": "no", "AllowedCPUs": "", "AllowedMemoryNodes": "", "AmbientCapabilities": "", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target network-pre.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUAffinity": "", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "ConfigurationDirectoryMode": "0755", "Conflicts": "ipset.service iptables.service nftables.service shutdown.target ip6tables.service ebtables.service", "ControlPID": "0", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "DynamicUser": "no", "EffectiveCPUs": "", "EffectiveMemoryNodes": "", "EnvironmentFiles": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOSchedulingClass": "0", "IOSchedulingPriority": "0", "IOWeight": "[not set]", "IPAccounting": "no", "IPEgressBytes": "18446744073709551615", "IPEgressPackets": "18446744073709551615", "IPIngressBytes": "18446744073709551615", "IPIngressPackets": "18446744073709551615", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "0", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "262144", "LimitNOFILESoft": "1024", "LimitNPROC": "14003", "LimitNPROCSoft": "14003", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14003", "LimitSIGPENDINGSoft": "14003", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "0", "MemoryAccounting": "yes", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemorySwapMax": "infinity", "MountAPIVFS": "no", "MountFlags": "", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAMask": "", "NUMAPolicy": "n/a", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "Perpetual": "no", "PrivateDevices": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "dbus.socket system.slice sysinit.target", "Restart": "no", "RestartUSec": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardInputData": "", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StateChangeTimestampMonotonic": "0", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "[not set]", "TasksMax": "22405", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "UtmpMode": "init", "Wants": "network-pre.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [Add extra options to check] ********************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:29 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.510) 0:00:02.280 ******** ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "auto": "start", "dpdaction": "restart", "dpddelay": "30s", "dpdtimeout": "31s", "esp": "esp_string_for_testing", "hosts": { "host01.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "host02.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "mainhost.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "sut": "" }, "ike": "ike_string_for_testing", "ikelifetime": "15h", "leftupdown": "leftupdown --option=value", "retransmit_timeout": "10s", "salifetime": "16h", "shared_key_content": "shared_key_for_testing", "type": "tunnel_type_for_testing" } ] }, "changed": false } TASK [Use vpn role] ************************************************************ task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:60 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.015) 0:00:02.296 ******** TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:3 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.027) 0:00:02.323 ******** included: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml for sut TASK [fedora.linux_system_roles.vpn : Ensure ansible_facts used by role] ******* task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.012) 0:00:02.336 ******** skipping: [sut] => { "changed": false, "false_condition": "__vpn_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Check if system is ostree] *************** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:10 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.018) 0:00:02.354 ******** skipping: [sut] => { "changed": false, "false_condition": "not __vpn_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:15 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.010) 0:00:02.365 ******** skipping: [sut] => { "changed": false, "false_condition": "not __vpn_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:19 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.011) 0:00:02.376 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "CentOS.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=CentOS_8.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/CentOS_8.yml" ], "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml" } ok: [sut] => (item=CentOS_8.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/CentOS_8.yml" ], "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml" } TASK [fedora.linux_system_roles.vpn : Ensure required packages are installed] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:6 Sunday 28 January 2024 04:55:46 +0000 (0:00:00.024) 0:00:02.400 ******** changed: [sut] => { "changed": true, "rc": 0, "results": [ "Installed: libreswan-4.12-2.el8.x86_64" ] } lsrpackages: iproute libreswan TASK [fedora.linux_system_roles.vpn : Configure firewall] ********************** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:13 Sunday 28 January 2024 04:55:50 +0000 (0:00:04.003) 0:00:06.404 ******** included: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/firewall.yml for sut TASK [Ensure the vpn ports status with the firewall role] ********************** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/firewall.yml:3 Sunday 28 January 2024 04:55:50 +0000 (0:00:00.012) 0:00:06.416 ******** skipping: [sut] => { "changed": false, "false_condition": "vpn_manage_firewall | bool", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Configure selinux] *********************** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:16 Sunday 28 January 2024 04:55:50 +0000 (0:00:00.016) 0:00:06.432 ******** included: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml for sut TASK [fedora.linux_system_roles.vpn : Populate service facts] ****************** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:3 Sunday 28 January 2024 04:55:50 +0000 (0:00:00.014) 0:00:06.446 ******** ok: [sut] => { "ansible_facts": { "services": { "NetworkManager-dispatcher.service": { "name": "NetworkManager-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "NetworkManager-wait-online.service": { "name": "NetworkManager-wait-online.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "NetworkManager.service": { "name": "NetworkManager.service", "source": "systemd", "state": "running", "status": "enabled" }, "auditd.service": { "name": "auditd.service", "source": "systemd", "state": "running", "status": "enabled" }, "auth-rpcgss-module.service": { "name": "auth-rpcgss-module.service", "source": "systemd", "state": "stopped", "status": "static" }, "auto-cpufreq.service": { "name": "auto-cpufreq.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "autovt@.service": { "name": "autovt@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "chrony-dnssrv@.service": { "name": "chrony-dnssrv@.service", "source": "systemd", "state": "unknown", "status": "static" }, "chrony-wait.service": { "name": "chrony-wait.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "chronyd.service": { "name": "chronyd.service", "source": "systemd", "state": "running", "status": "enabled" }, "cloud-config.service": { "name": "cloud-config.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-final.service": { "name": "cloud-final.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init-hotplugd.service": { "name": "cloud-init-hotplugd.service", "source": "systemd", "state": "inactive", "status": "static" }, "cloud-init-local.service": { "name": "cloud-init-local.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init.service": { "name": "cloud-init.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "console-getty.service": { "name": "console-getty.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "container-getty@.service": { "name": "container-getty@.service", "source": "systemd", "state": "unknown", "status": "static" }, "cpupower.service": { "name": "cpupower.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "crond.service": { "name": "crond.service", "source": "systemd", "state": "running", "status": "enabled" }, "dbus-org.freedesktop.hostname1.service": { "name": "dbus-org.freedesktop.hostname1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.locale1.service": { "name": "dbus-org.freedesktop.locale1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.login1.service": { "name": "dbus-org.freedesktop.login1.service", "source": "systemd", "state": "active", "status": "static" }, "dbus-org.freedesktop.nm-dispatcher.service": { "name": "dbus-org.freedesktop.nm-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus-org.freedesktop.portable1.service": { "name": "dbus-org.freedesktop.portable1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.timedate1.service": { "name": "dbus-org.freedesktop.timedate1.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus.service": { "name": "dbus.service", "source": "systemd", "state": "running", "status": "static" }, "debug-shell.service": { "name": "debug-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "display-manager.service": { "name": "display-manager.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "dnf-makecache.service": { "name": "dnf-makecache.service", "source": "systemd", "state": "stopped", "status": "static" }, "dnf-system-upgrade-cleanup.service": { "name": "dnf-system-upgrade-cleanup.service", "source": "systemd", "state": "inactive", "status": "static" }, "dnf-system-upgrade.service": { "name": "dnf-system-upgrade.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "dracut-cmdline.service": { "name": "dracut-cmdline.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-initqueue.service": { "name": "dracut-initqueue.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-mount.service": { "name": "dracut-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-mount.service": { "name": "dracut-pre-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-pivot.service": { "name": "dracut-pre-pivot.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-trigger.service": { "name": "dracut-pre-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-udev.service": { "name": "dracut-pre-udev.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown-onfailure.service": { "name": "dracut-shutdown-onfailure.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown.service": { "name": "dracut-shutdown.service", "source": "systemd", "state": "stopped", "status": "static" }, "ebtables.service": { "name": "ebtables.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "emergency.service": { "name": "emergency.service", "source": "systemd", "state": "stopped", "status": "static" }, "firewalld.service": { "name": "firewalld.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "fstrim.service": { "name": "fstrim.service", "source": "systemd", "state": "inactive", "status": "static" }, "getty@.service": { "name": "getty@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "getty@tty1.service": { "name": "getty@tty1.service", "source": "systemd", "state": "running", "status": "active" }, "grub-boot-indeterminate.service": { "name": "grub-boot-indeterminate.service", "source": "systemd", "state": "inactive", "status": "static" }, "gssproxy.service": { "name": "gssproxy.service", "source": "systemd", "state": "running", "status": "disabled" }, "halt-local.service": { "name": "halt-local.service", "source": "systemd", "state": "inactive", "status": "static" }, "hv_kvp_daemon.service": { "name": "hv_kvp_daemon.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "import-state.service": { "name": "import-state.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "initrd-cleanup.service": { "name": "initrd-cleanup.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-parse-etc.service": { "name": "initrd-parse-etc.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-switch-root.service": { "name": "initrd-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-udevadm-cleanup-db.service": { "name": "initrd-udevadm-cleanup-db.service", "source": "systemd", "state": "stopped", "status": "static" }, "iprdump.service": { "name": "iprdump.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprinit.service": { "name": "iprinit.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprupdate.service": { "name": "iprupdate.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ipsec.service": { "name": "ipsec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "irqbalance.service": { "name": "irqbalance.service", "source": "systemd", "state": "running", "status": "enabled" }, "kdump.service": { "name": "kdump.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "kmod-static-nodes.service": { "name": "kmod-static-nodes.service", "source": "systemd", "state": "stopped", "status": "static" }, "kvm_stat.service": { "name": "kvm_stat.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ldconfig.service": { "name": "ldconfig.service", "source": "systemd", "state": "stopped", "status": "static" }, "loadmodules.service": { "name": "loadmodules.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "man-db-cache-update.service": { "name": "man-db-cache-update.service", "source": "systemd", "state": "inactive", "status": "static" }, "man-db-restart-cache-update.service": { "name": "man-db-restart-cache-update.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "messagebus.service": { "name": "messagebus.service", "source": "systemd", "state": "active", "status": "static" }, "microcode.service": { "name": "microcode.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "modprobe@efi_pstore.service": { "name": "modprobe@efi_pstore.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "network.service": { "name": "network.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "nfs-blkmap.service": { "name": "nfs-blkmap.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-convert.service": { "name": "nfs-convert.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-idmapd.service": { "name": "nfs-idmapd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-mountd.service": { "name": "nfs-mountd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-server.service": { "name": "nfs-server.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nfs-utils.service": { "name": "nfs-utils.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfsdcld.service": { "name": "nfsdcld.service", "source": "systemd", "state": "stopped", "status": "static" }, "nftables.service": { "name": "nftables.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nis-domainname.service": { "name": "nis-domainname.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "ntpd.service": { "name": "ntpd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ntpdate.service": { "name": "ntpdate.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "oddjobd.service": { "name": "oddjobd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-halt.service": { "name": "plymouth-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-kexec.service": { "name": "plymouth-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-poweroff.service": { "name": "plymouth-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-quit-wait.service": { "name": "plymouth-quit-wait.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-quit.service": { "name": "plymouth-quit.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-read-write.service": { "name": "plymouth-read-write.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-reboot.service": { "name": "plymouth-reboot.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-start.service": { "name": "plymouth-start.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-switch-root-initramfs.service": { "name": "plymouth-switch-root-initramfs.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-switch-root.service": { "name": "plymouth-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "polkit.service": { "name": "polkit.service", "source": "systemd", "state": "running", "status": "static" }, "power-profiles-daemon.service": { "name": "power-profiles-daemon.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "qemu-guest-agent.service": { "name": "qemu-guest-agent.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "quotaon.service": { "name": "quotaon.service", "source": "systemd", "state": "inactive", "status": "static" }, "rc-local.service": { "name": "rc-local.service", "source": "systemd", "state": "stopped", "status": "static" }, "rdisc.service": { "name": "rdisc.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rescue.service": { "name": "rescue.service", "source": "systemd", "state": "stopped", "status": "static" }, "restraintd.service": { "name": "restraintd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rngd.service": { "name": "rngd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpc-gssd.service": { "name": "rpc-gssd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd-notify.service": { "name": "rpc-statd-notify.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd.service": { "name": "rpc-statd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpcbind.service": { "name": "rpcbind.service", "source": "systemd", "state": "running", "status": "enabled" }, "rsyslog.service": { "name": "rsyslog.service", "source": "systemd", "state": "running", "status": "enabled" }, "selinux-autorelabel-mark.service": { "name": "selinux-autorelabel-mark.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "selinux-autorelabel.service": { "name": "selinux-autorelabel.service", "source": "systemd", "state": "inactive", "status": "static" }, "serial-getty@.service": { "name": "serial-getty@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "snapd.seeded.service": { "name": "snapd.seeded.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sntp.service": { "name": "sntp.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sshd-keygen.service": { "name": "sshd-keygen.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sshd-keygen@.service": { "name": "sshd-keygen@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "sshd-keygen@ecdsa.service": { "name": "sshd-keygen@ecdsa.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd-keygen@ed25519.service": { "name": "sshd-keygen@ed25519.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd-keygen@rsa.service": { "name": "sshd-keygen@rsa.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd.service": { "name": "sshd.service", "source": "systemd", "state": "running", "status": "enabled" }, "sshd@.service": { "name": "sshd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "sssd-autofs.service": { "name": "sssd-autofs.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-kcm.service": { "name": "sssd-kcm.service", "source": "systemd", "state": "stopped", "status": "indirect" }, "sssd-nss.service": { "name": "sssd-nss.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-pac.service": { "name": "sssd-pac.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-pam.service": { "name": "sssd-pam.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-ssh.service": { "name": "sssd-ssh.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-sudo.service": { "name": "sssd-sudo.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd.service": { "name": "sssd.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "syslog.service": { "name": "syslog.service", "source": "systemd", "state": "active", "status": "enabled" }, "system-update-cleanup.service": { "name": "system-update-cleanup.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-ask-password-console.service": { "name": "systemd-ask-password-console.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-plymouth.service": { "name": "systemd-ask-password-plymouth.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-wall.service": { "name": "systemd-ask-password-wall.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-backlight@.service": { "name": "systemd-backlight@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-binfmt.service": { "name": "systemd-binfmt.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-coredump@.service": { "name": "systemd-coredump@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-exit.service": { "name": "systemd-exit.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-firstboot.service": { "name": "systemd-firstboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck-root.service": { "name": "systemd-fsck-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck@.service": { "name": "systemd-fsck@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-halt.service": { "name": "systemd-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hibernate-resume@.service": { "name": "systemd-hibernate-resume@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-hibernate.service": { "name": "systemd-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hostnamed.service": { "name": "systemd-hostnamed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hwdb-update.service": { "name": "systemd-hwdb-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-hybrid-sleep.service": { "name": "systemd-hybrid-sleep.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-initctl.service": { "name": "systemd-initctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-catalog-update.service": { "name": "systemd-journal-catalog-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-flush.service": { "name": "systemd-journal-flush.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journald.service": { "name": "systemd-journald.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-kexec.service": { "name": "systemd-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-localed.service": { "name": "systemd-localed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-logind.service": { "name": "systemd-logind.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-machine-id-commit.service": { "name": "systemd-machine-id-commit.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-modules-load.service": { "name": "systemd-modules-load.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-networkd-wait-online.service": { "name": "systemd-networkd-wait-online.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-portabled.service": { "name": "systemd-portabled.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-poweroff.service": { "name": "systemd-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-pstore.service": { "name": "systemd-pstore.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-quotacheck.service": { "name": "systemd-quotacheck.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-random-seed.service": { "name": "systemd-random-seed.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-reboot.service": { "name": "systemd-reboot.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-remount-fs.service": { "name": "systemd-remount-fs.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-resolved.service": { "name": "systemd-resolved.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-rfkill.service": { "name": "systemd-rfkill.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-suspend-then-hibernate.service": { "name": "systemd-suspend-then-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-suspend.service": { "name": "systemd-suspend.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-sysctl.service": { "name": "systemd-sysctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-sysusers.service": { "name": "systemd-sysusers.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-timedated.service": { "name": "systemd-timedated.service", "source": "systemd", "state": "inactive", "status": "masked" }, "systemd-timesyncd.service": { "name": "systemd-timesyncd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-tmpfiles-clean.service": { "name": "systemd-tmpfiles-clean.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup-dev.service": { "name": "systemd-tmpfiles-setup-dev.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup.service": { "name": "systemd-tmpfiles-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-settle.service": { "name": "systemd-udev-settle.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-udev-trigger.service": { "name": "systemd-udev-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udevd.service": { "name": "systemd-udevd.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-update-done.service": { "name": "systemd-update-done.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp-runlevel.service": { "name": "systemd-update-utmp-runlevel.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp.service": { "name": "systemd-update-utmp.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-user-sessions.service": { "name": "systemd-user-sessions.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-vconsole-setup.service": { "name": "systemd-vconsole-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-volatile-root.service": { "name": "systemd-volatile-root.service", "source": "systemd", "state": "inactive", "status": "static" }, "tcsd.service": { "name": "tcsd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "teamd@.service": { "name": "teamd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "timedatex.service": { "name": "timedatex.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "tlp.service": { "name": "tlp.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "tuned.service": { "name": "tuned.service", "source": "systemd", "state": "running", "status": "enabled" }, "unbound-anchor.service": { "name": "unbound-anchor.service", "source": "systemd", "state": "stopped", "status": "static" }, "user-runtime-dir@.service": { "name": "user-runtime-dir@.service", "source": "systemd", "state": "unknown", "status": "static" }, "user-runtime-dir@0.service": { "name": "user-runtime-dir@0.service", "source": "systemd", "state": "stopped", "status": "active" }, "user@.service": { "name": "user@.service", "source": "systemd", "state": "unknown", "status": "static" }, "user@0.service": { "name": "user@0.service", "source": "systemd", "state": "running", "status": "active" }, "ypbind.service": { "name": "ypbind.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "yppasswdd.service": { "name": "yppasswdd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ypserv.service": { "name": "ypserv.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ypxfrd.service": { "name": "ypxfrd.service", "source": "systemd", "state": "stopped", "status": "not-found" } } }, "changed": false } TASK [fedora.linux_system_roles.vpn : Get the ipsec tcp service ports] ********* task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:12 Sunday 28 January 2024 04:55:52 +0000 (0:00:01.712) 0:00:08.159 ******** skipping: [sut] => { "changed": false, "false_condition": "ansible_facts.services[\"firewalld.service\"][\"state\"] == \"running\"", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Initialize _vpn_selinux] ***************** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:20 Sunday 28 January 2024 04:55:52 +0000 (0:00:00.012) 0:00:08.171 ******** skipping: [sut] => { "changed": false, "false_condition": "ansible_facts.services[\"firewalld.service\"][\"state\"] == \"running\"", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Add the ipsec service ports to _vpn_selinux] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:24 Sunday 28 January 2024 04:55:52 +0000 (0:00:00.011) 0:00:08.183 ******** skipping: [sut] => { "changed": false, "false_condition": "ansible_facts.services[\"firewalld.service\"][\"state\"] == \"running\"", "skip_reason": "Conditional result was False" } TASK [Ensure the service and the ports status with the selinux role] *********** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:31 Sunday 28 January 2024 04:55:52 +0000 (0:00:00.012) 0:00:08.196 ******** skipping: [sut] => { "changed": false, "false_condition": "ansible_facts.services[\"firewalld.service\"][\"state\"] == \"running\"", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Ensure OpenSSL is installed on the controller] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:26 Sunday 28 January 2024 04:55:52 +0000 (0:00:00.011) 0:00:08.207 ******** skipping: [sut] => { "changed": false, "false_condition": "vpn_ensure_openssl | d(true)", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Enforce default auth method as needed] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:34 Sunday 28 January 2024 04:55:52 +0000 (0:00:00.018) 0:00:08.226 ******** ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "psk", "auto": "start", "dpdaction": "restart", "dpddelay": "30s", "dpdtimeout": "31s", "esp": "esp_string_for_testing", "hosts": { "host01.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "host02.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "mainhost.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "sut": "" }, "ike": "ike_string_for_testing", "ikelifetime": "15h", "leftupdown": "leftupdown --option=value", "retransmit_timeout": "10s", "salifetime": "16h", "shared_key_content": "shared_key_for_testing", "type": "tunnel_type_for_testing" } ] }, "changed": false } TASK [fedora.linux_system_roles.vpn : Make sure that the hosts list is not empty] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:44 Sunday 28 January 2024 04:55:52 +0000 (0:00:00.021) 0:00:08.247 ******** skipping: [sut] => { "changed": false, "false_condition": "\"True\" in failure", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Make sure there is at least one pair of hosts in each connection] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:59 Sunday 28 January 2024 04:55:52 +0000 (0:00:00.019) 0:00:08.267 ******** ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "psk", "auto": "start", "dpdaction": "restart", "dpddelay": "30s", "dpdtimeout": "31s", "esp": "esp_string_for_testing", "hosts": { "host01.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "host02.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "mainhost.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "sut": "" }, "ike": "ike_string_for_testing", "ikelifetime": "15h", "leftupdown": "leftupdown --option=value", "retransmit_timeout": "10s", "salifetime": "16h", "shared_key_content": "shared_key_for_testing", "type": "tunnel_type_for_testing" } ] }, "changed": false } TASK [fedora.linux_system_roles.vpn : Ensure cert_names are populated when auth_method is cert] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:73 Sunday 28 January 2024 04:55:52 +0000 (0:00:00.023) 0:00:08.290 ******** skipping: [sut] => { "changed": false, "false_condition": "\"True\" in failure", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Generate PSKs or use provided shared_key_content] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:100 Sunday 28 January 2024 04:55:52 +0000 (0:00:00.028) 0:00:08.319 ******** ok: [sut -> localhost] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [fedora.linux_system_roles.vpn : Set psks for hosts] ********************** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:137 Sunday 28 January 2024 04:55:52 +0000 (0:00:00.028) 0:00:08.347 ******** ok: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [fedora.linux_system_roles.vpn : Create ipsec.conf files] ***************** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:161 Sunday 28 January 2024 04:55:52 +0000 (0:00:00.059) 0:00:08.407 ******** changed: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": true, "checksum": "1aaa38ce169f0f10e11e83ca17e784db0a5b15a9", "dest": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "gid": 0, "group": "root", "item": "host01.local", "md5sum": "ff6f6f5e1cb7af4246854afd4f868011", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 466, "src": "/root/.ansible/tmp/ansible-tmp-1706417752.970517-2906-45055067260570/source", "state": "file", "uid": 0 } changed: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": true, "checksum": "4f44b0aa502735782b6a4ada96b1e49b71ac94ed", "dest": "/etc/ipsec.d/mainhost.local-to-host02.local.conf", "gid": 0, "group": "root", "item": "host02.local", "md5sum": "f713fe2cd23eac3d38b8c455135fbecc", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 466, "src": "/root/.ansible/tmp/ansible-tmp-1706417753.6064026-2906-266607281987405/source", "state": "file", "uid": 0 } changed: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": true, "checksum": "f21658b582e7c845e539e917dfdc2b14273d1838", "dest": "/etc/ipsec.d/mainhost.local-to-sut.conf", "gid": 0, "group": "root", "item": "sut", "md5sum": "7fc612fc645c9f3273551ffb8fb49b35", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 458, "src": "/root/.ansible/tmp/ansible-tmp-1706417754.153253-2906-20893465399626/source", "state": "file", "uid": 0 } Notification for handler __vpn_handler_enable_start_vpn has been saved. Notification for handler __vpn_handler_enable_start_vpn has been saved. Notification for handler __vpn_handler_enable_start_vpn has been saved. TASK [fedora.linux_system_roles.vpn : Check if secrets file already exists] **** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:169 Sunday 28 January 2024 04:55:54 +0000 (0:00:01.755) 0:00:10.162 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "exists": false } } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "item": "host02.local", "stat": { "exists": false } } ok: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": false, "item": "sut", "stat": { "exists": false } } TASK [fedora.linux_system_roles.vpn : Create ipsec.secrets files] ************** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:175 Sunday 28 January 2024 04:55:55 +0000 (0:00:00.584) 0:00:10.747 ******** changed: [sut] => (item={'changed': False, 'stat': {'exists': False}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'follow': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "93759ec35bdf30eb5702da4ef83b311b588018a0", "dest": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "stat": { "exists": false } }, "md5sum": "f67ed89220c78a6485c3fee2dce29be5", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 113, "src": "/root/.ansible/tmp/ansible-tmp-1706417755.3029463-2948-279797596925936/source", "state": "file", "uid": 0 } changed: [sut] => (item={'changed': False, 'stat': {'exists': False}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets', 'follow': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "93759ec35bdf30eb5702da4ef83b311b588018a0", "dest": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" } }, "item": "host02.local", "stat": { "exists": false } }, "md5sum": "f67ed89220c78a6485c3fee2dce29be5", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 113, "src": "/root/.ansible/tmp/ansible-tmp-1706417755.859533-2948-540476554438/source", "state": "file", "uid": 0 } changed: [sut] => (item={'changed': False, 'stat': {'exists': False}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-sut.secrets', 'follow': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'sut', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "76d7a29c955fd7575160db15f445eb7a6bb67f61", "dest": "/etc/ipsec.d/mainhost.local-to-sut.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-sut.secrets" } }, "item": "sut", "stat": { "exists": false } }, "md5sum": "8b7953029295aabfb61acfa73fc9f1cc", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 105, "src": "/root/.ansible/tmp/ansible-tmp-1706417756.406454-2948-113168574897912/source", "state": "file", "uid": 0 } Notification for handler __vpn_handler_enable_start_vpn has been saved. Notification for handler __vpn_handler_enable_start_vpn has been saved. Notification for handler __vpn_handler_enable_start_vpn has been saved. TASK [fedora.linux_system_roles.vpn : Build opportunistic configuration] ******* task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:185 Sunday 28 January 2024 04:55:56 +0000 (0:00:01.666) 0:00:12.414 ******** skipping: [sut] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } skipping: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [Assert file existence] *************************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:65 Sunday 28 January 2024 04:55:56 +0000 (0:00:00.023) 0:00:12.437 ******** included: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/assert_conf_secrets_files_exist.yml for sut TASK [Stat conf files paths] *************************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/assert_conf_secrets_files_exist.yml:2 Sunday 28 January 2024 04:55:56 +0000 (0:00:00.019) 0:00:12.456 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "atime": 1706417753.522655, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "1aaa38ce169f0f10e11e83ca17e784db0a5b15a9", "ctime": 1706417753.526655, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 106954947, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1706417753.235658, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 466, "uid": 0, "version": "3027305260", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "item": "host02.local", "stat": { "atime": 1706417754.0676491, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "4f44b0aa502735782b6a4ada96b1e49b71ac94ed", "ctime": 1706417754.071649, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 113246402, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1706417753.8636513, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 466, "uid": 0, "version": "1771320270", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Stat secrets files paths] ************************************************ task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/assert_conf_secrets_files_exist.yml:8 Sunday 28 January 2024 04:55:57 +0000 (0:00:00.410) 0:00:12.867 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "atime": 1706417755.774631, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "93759ec35bdf30eb5702da4ef83b311b588018a0", "ctime": 1706417755.782631, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 132120897, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1706417755.568633, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 113, "uid": 0, "version": "1921010280", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "item": "host02.local", "stat": { "atime": 1706417756.321625, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "93759ec35bdf30eb5702da4ef83b311b588018a0", "ctime": 1706417756.330625, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 138412353, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1706417756.1176274, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 113, "uid": 0, "version": "1608145970", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Assert that ipsec.conf and secrets files exist] ************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/assert_conf_secrets_files_exist.yml:14 Sunday 28 January 2024 04:55:57 +0000 (0:00:00.413) 0:00:13.281 ******** ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'mode': '0644', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 466, 'inode': 106954947, 'dev': 51713, 'nlink': 1, 'atime': 1706417753.522655, 'mtime': 1706417753.235658, 'ctime': 1706417753.526655, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': True, 'xgrp': False, 'woth': False, 'roth': True, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': '1aaa38ce169f0f10e11e83ca17e784db0a5b15a9', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '3027305260', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'follow': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } }, "item": "host01.local", "stat": { "atime": 1706417753.522655, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "1aaa38ce169f0f10e11e83ca17e784db0a5b15a9", "ctime": 1706417753.526655, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 106954947, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1706417753.235658, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 466, "uid": 0, "version": "3027305260", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host02.local.conf', 'mode': '0644', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 466, 'inode': 113246402, 'dev': 51713, 'nlink': 1, 'atime': 1706417754.0676491, 'mtime': 1706417753.8636513, 'ctime': 1706417754.071649, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': True, 'xgrp': False, 'woth': False, 'roth': True, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': '4f44b0aa502735782b6a4ada96b1e49b71ac94ed', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '1771320270', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host02.local.conf', 'follow': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.conf" } }, "item": "host02.local", "stat": { "atime": 1706417754.0676491, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "4f44b0aa502735782b6a4ada96b1e49b71ac94ed", "ctime": 1706417754.071649, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 113246402, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1706417753.8636513, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 466, "uid": 0, "version": "1771320270", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed TASK [Assert that ipsec.conf and secrets files exist] ************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/assert_conf_secrets_files_exist.yml:20 Sunday 28 January 2024 04:55:57 +0000 (0:00:00.018) 0:00:13.299 ******** ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'mode': '0600', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 113, 'inode': 132120897, 'dev': 51713, 'nlink': 1, 'atime': 1706417755.774631, 'mtime': 1706417755.568633, 'ctime': 1706417755.782631, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': False, 'xgrp': False, 'woth': False, 'roth': False, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': '93759ec35bdf30eb5702da4ef83b311b588018a0', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '1921010280', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'follow': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "stat": { "atime": 1706417755.774631, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "93759ec35bdf30eb5702da4ef83b311b588018a0", "ctime": 1706417755.782631, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 132120897, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1706417755.568633, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 113, "uid": 0, "version": "1921010280", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets', 'mode': '0600', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 113, 'inode': 138412353, 'dev': 51713, 'nlink': 1, 'atime': 1706417756.321625, 'mtime': 1706417756.1176274, 'ctime': 1706417756.330625, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': False, 'xgrp': False, 'woth': False, 'roth': False, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': '93759ec35bdf30eb5702da4ef83b311b588018a0', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '1608145970', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets', 'follow': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" } }, "item": "host02.local", "stat": { "atime": 1706417756.321625, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "93759ec35bdf30eb5702da4ef83b311b588018a0", "ctime": 1706417756.330625, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 138412353, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1706417756.1176274, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 113, "uid": 0, "version": "1608145970", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed TASK [Reset success flag] ****************************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:68 Sunday 28 January 2024 04:55:57 +0000 (0:00:00.017) 0:00:13.317 ******** ok: [sut] => { "ansible_facts": { "__vpn_success": true }, "changed": false } TASK [Get and store conf files] ************************************************ task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:72 Sunday 28 January 2024 04:55:57 +0000 (0:00:00.009) 0:00:13.326 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "content": "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", "encoding": "base64", "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "content": "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", "encoding": "base64", "item": "host02.local", "source": "/etc/ipsec.d/mainhost.local-to-host02.local.conf" } TASK [Check that conf file contains correct information] *********************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:78 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.452) 0:00:13.778 ******** skipping: [sut] => (item={'content': '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', 'source': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host01.local.conf'}}, 'failed': False, 'changed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "false_condition": "item.content | b64decode is not search('left=' + __vpn_main_hostname) or item.content | b64decode is not search('leftid=@' + __vpn_leftid) or item.content | b64decode is not search('right=host0' + (idx + 1) | string + '.local') or item.content | b64decode is not search('rightid=@' + __vpn_rightid) or item.content | b64decode is not search('ikev2=insist') or item.content | b64decode is not search('authby=secret') or item.content | b64decode is not search('auto=start') or item.content | b64decode is not search('ike=' + __vpn_ike) or item.content | b64decode is not search('esp=' + __vpn_esp) or item.content | b64decode is not search('ikelifetime=' + __vpn_ikelifetime) or item.content | b64decode is not search('salifetime=' + __vpn_salifetime) or item.content | b64decode is not search('type=' + __vpn_type) or item.content | b64decode is not search('retransmit-timeout=' + __vpn_retransmit_timeout) or item.content | b64decode is not search('dpddelay=' + __vpn_dpddelay) or item.content | b64decode is not search('dpdtimeout=' + __vpn_dpdtimeout) or item.content | b64decode is not search('dpdaction=' + __vpn_dpdaction) or item.content | b64decode is not search('leftupdown=' + __vpn_leftupdown_expected)", "idx": 0, "item": { "ansible_loop_var": "item", "changed": false, "content": "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", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } }, "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'content': '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', 'source': '/etc/ipsec.d/mainhost.local-to-host02.local.conf', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host02.local.conf'}}, 'failed': False, 'changed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "false_condition": "item.content | b64decode is not search('left=' + __vpn_main_hostname) or item.content | b64decode is not search('leftid=@' + __vpn_leftid) or item.content | b64decode is not search('right=host0' + (idx + 1) | string + '.local') or item.content | b64decode is not search('rightid=@' + __vpn_rightid) or item.content | b64decode is not search('ikev2=insist') or item.content | b64decode is not search('authby=secret') or item.content | b64decode is not search('auto=start') or item.content | b64decode is not search('ike=' + __vpn_ike) or item.content | b64decode is not search('esp=' + __vpn_esp) or item.content | b64decode is not search('ikelifetime=' + __vpn_ikelifetime) or item.content | b64decode is not search('salifetime=' + __vpn_salifetime) or item.content | b64decode is not search('type=' + __vpn_type) or item.content | b64decode is not search('retransmit-timeout=' + __vpn_retransmit_timeout) or item.content | b64decode is not search('dpddelay=' + __vpn_dpddelay) or item.content | b64decode is not search('dpdtimeout=' + __vpn_dpdtimeout) or item.content | b64decode is not search('dpdaction=' + __vpn_dpdaction) or item.content | b64decode is not search('leftupdown=' + __vpn_leftupdown_expected)", "idx": 1, "item": { "ansible_loop_var": "item", "changed": false, "content": "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", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host02.local.conf" } }, "item": "host02.local", "source": "/etc/ipsec.d/mainhost.local-to-host02.local.conf" }, "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [Assert success for conf files] ******************************************* task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:120 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.052) 0:00:13.830 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get and store secrets files] ********************************************* task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:125 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.018) 0:00:13.849 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpAbGVmdGlkX2Zvcl90ZXN0aW5nIEByaWdodGlkX2Zvcl90ZXN0aW5nIDogUFNLICJzaGFyZWRfa2V5X2Zvcl90ZXN0aW5nIgo=", "encoding": "base64", "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpAbGVmdGlkX2Zvcl90ZXN0aW5nIEByaWdodGlkX2Zvcl90ZXN0aW5nIDogUFNLICJzaGFyZWRfa2V5X2Zvcl90ZXN0aW5nIgo=", "encoding": "base64", "item": "host02.local", "source": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" } TASK [Check that secrets file contains correct information] ******************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:131 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.379) 0:00:14.229 ******** skipping: [sut] => (item={'content': 'IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpAbGVmdGlkX2Zvcl90ZXN0aW5nIEByaWdodGlkX2Zvcl90ZXN0aW5nIDogUFNLICJzaGFyZWRfa2V5X2Zvcl90ZXN0aW5nIgo=', 'source': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets'}}, 'failed': False, 'changed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "false_condition": "item.content | b64decode | regex_search('^@' + __vpn_leftid + ' @' + __vpn_rightid + ' : PSK \"' + __vpn_shared_key + '\"', multiline=True) | d() | length == 0", "idx": 0, "item": { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpAbGVmdGlkX2Zvcl90ZXN0aW5nIEByaWdodGlkX2Zvcl90ZXN0aW5nIDogUFNLICJzaGFyZWRfa2V5X2Zvcl90ZXN0aW5nIgo=", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'content': 'IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpAbGVmdGlkX2Zvcl90ZXN0aW5nIEByaWdodGlkX2Zvcl90ZXN0aW5nIDogUFNLICJzaGFyZWRfa2V5X2Zvcl90ZXN0aW5nIgo=', 'source': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets'}}, 'failed': False, 'changed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "false_condition": "item.content | b64decode | regex_search('^@' + __vpn_leftid + ' @' + __vpn_rightid + ' : PSK \"' + __vpn_shared_key + '\"', multiline=True) | d() | length == 0", "idx": 1, "item": { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpAbGVmdGlkX2Zvcl90ZXN0aW5nIEByaWdodGlkX2Zvcl90ZXN0aW5nIDogUFNLICJzaGFyZWRfa2V5X2Zvcl90ZXN0aW5nIgo=", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" } }, "item": "host02.local", "source": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" }, "skip_reason": "Conditional result was False" } skipping: [sut] => { "changed": false } MSG: All items skipped TASK [Assert success for secrets files] **************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:143 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.028) 0:00:14.258 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Check the firewall and the selinux port status] ************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:148 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.018) 0:00:14.277 ******** included: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/check_firewall_selinux.yml for sut TASK [Get firewall service] **************************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/check_firewall_selinux.yml:9 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.018) 0:00:14.295 ******** skipping: [sut] => { "changed": false, "false_condition": "vpn_manage_firewall or vpn_manage_selinux", "skip_reason": "Conditional result was False" } TASK [Ensure 'ipsec' is in the firewalld service list] ************************* task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/check_firewall_selinux.yml:14 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.009) 0:00:14.305 ******** skipping: [sut] => { "changed": false, "false_condition": "vpn_manage_firewall or vpn_manage_selinux", "skip_reason": "Conditional result was False" } TASK [Get associated selinux ports] ******************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/check_firewall_selinux.yml:19 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.008) 0:00:14.314 ******** skipping: [sut] => { "changed": false, "false_condition": "vpn_manage_firewall or vpn_manage_selinux", "skip_reason": "Conditional result was False" } TASK [Check associated selinux ports when vpn_manage_selinux is true] ********** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/check_firewall_selinux.yml:27 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.008) 0:00:14.323 ******** skipping: [sut] => { "changed": false, "false_condition": "vpn_manage_firewall or vpn_manage_selinux", "skip_reason": "Conditional result was False" } TASK [Cleanup] ***************************************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:151 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.009) 0:00:14.333 ******** included: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/cleanup.yml for sut TASK [Set platform/version specific variables] ********************************* task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/cleanup.yml:2 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.021) 0:00:14.354 ******** TASK [fedora.linux_system_roles.vpn : Ensure ansible_facts used by role] ******* task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.018) 0:00:14.373 ******** skipping: [sut] => { "changed": false, "false_condition": "__vpn_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Check if system is ostree] *************** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:10 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.019) 0:00:14.393 ******** skipping: [sut] => { "changed": false, "false_condition": "not __vpn_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:15 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.012) 0:00:14.405 ******** skipping: [sut] => { "changed": false, "false_condition": "not __vpn_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:19 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.012) 0:00:14.418 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vpn_vars_file is file", "item": "CentOS.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=CentOS_8.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/CentOS_8.yml" ], "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml" } ok: [sut] => (item=CentOS_8.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/CentOS_8.yml" ], "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml" } TASK [Get service facts] ******************************************************* task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/cleanup.yml:8 Sunday 28 January 2024 04:55:58 +0000 (0:00:00.029) 0:00:14.448 ******** ok: [sut] => { "ansible_facts": { "services": { "NetworkManager-dispatcher.service": { "name": "NetworkManager-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "NetworkManager-wait-online.service": { "name": "NetworkManager-wait-online.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "NetworkManager.service": { "name": "NetworkManager.service", "source": "systemd", "state": "running", "status": "enabled" }, "auditd.service": { "name": "auditd.service", "source": "systemd", "state": "running", "status": "enabled" }, "auth-rpcgss-module.service": { "name": "auth-rpcgss-module.service", "source": "systemd", "state": "stopped", "status": "static" }, "auto-cpufreq.service": { "name": "auto-cpufreq.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "autovt@.service": { "name": "autovt@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "chrony-dnssrv@.service": { "name": "chrony-dnssrv@.service", "source": "systemd", "state": "unknown", "status": "static" }, "chrony-wait.service": { "name": "chrony-wait.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "chronyd.service": { "name": "chronyd.service", "source": "systemd", "state": "running", "status": "enabled" }, "cloud-config.service": { "name": "cloud-config.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-final.service": { "name": "cloud-final.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init-hotplugd.service": { "name": "cloud-init-hotplugd.service", "source": "systemd", "state": "inactive", "status": "static" }, "cloud-init-local.service": { "name": "cloud-init-local.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init.service": { "name": "cloud-init.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "console-getty.service": { "name": "console-getty.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "container-getty@.service": { "name": "container-getty@.service", "source": "systemd", "state": "unknown", "status": "static" }, "cpupower.service": { "name": "cpupower.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "crond.service": { "name": "crond.service", "source": "systemd", "state": "running", "status": "enabled" }, "dbus-org.freedesktop.hostname1.service": { "name": "dbus-org.freedesktop.hostname1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.locale1.service": { "name": "dbus-org.freedesktop.locale1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.login1.service": { "name": "dbus-org.freedesktop.login1.service", "source": "systemd", "state": "active", "status": "static" }, "dbus-org.freedesktop.nm-dispatcher.service": { "name": "dbus-org.freedesktop.nm-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus-org.freedesktop.portable1.service": { "name": "dbus-org.freedesktop.portable1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.timedate1.service": { "name": "dbus-org.freedesktop.timedate1.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus.service": { "name": "dbus.service", "source": "systemd", "state": "running", "status": "static" }, "debug-shell.service": { "name": "debug-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "display-manager.service": { "name": "display-manager.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "dnf-makecache.service": { "name": "dnf-makecache.service", "source": "systemd", "state": "stopped", "status": "static" }, "dnf-system-upgrade-cleanup.service": { "name": "dnf-system-upgrade-cleanup.service", "source": "systemd", "state": "inactive", "status": "static" }, "dnf-system-upgrade.service": { "name": "dnf-system-upgrade.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "dracut-cmdline.service": { "name": "dracut-cmdline.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-initqueue.service": { "name": "dracut-initqueue.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-mount.service": { "name": "dracut-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-mount.service": { "name": "dracut-pre-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-pivot.service": { "name": "dracut-pre-pivot.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-trigger.service": { "name": "dracut-pre-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-udev.service": { "name": "dracut-pre-udev.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown-onfailure.service": { "name": "dracut-shutdown-onfailure.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown.service": { "name": "dracut-shutdown.service", "source": "systemd", "state": "stopped", "status": "static" }, "ebtables.service": { "name": "ebtables.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "emergency.service": { "name": "emergency.service", "source": "systemd", "state": "stopped", "status": "static" }, "firewalld.service": { "name": "firewalld.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "fstrim.service": { "name": "fstrim.service", "source": "systemd", "state": "inactive", "status": "static" }, "getty@.service": { "name": "getty@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "getty@tty1.service": { "name": "getty@tty1.service", "source": "systemd", "state": "running", "status": "active" }, "grub-boot-indeterminate.service": { "name": "grub-boot-indeterminate.service", "source": "systemd", "state": "inactive", "status": "static" }, "gssproxy.service": { "name": "gssproxy.service", "source": "systemd", "state": "running", "status": "disabled" }, "halt-local.service": { "name": "halt-local.service", "source": "systemd", "state": "inactive", "status": "static" }, "hv_kvp_daemon.service": { "name": "hv_kvp_daemon.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "import-state.service": { "name": "import-state.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "initrd-cleanup.service": { "name": "initrd-cleanup.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-parse-etc.service": { "name": "initrd-parse-etc.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-switch-root.service": { "name": "initrd-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-udevadm-cleanup-db.service": { "name": "initrd-udevadm-cleanup-db.service", "source": "systemd", "state": "stopped", "status": "static" }, "iprdump.service": { "name": "iprdump.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprinit.service": { "name": "iprinit.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprupdate.service": { "name": "iprupdate.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ipsec.service": { "name": "ipsec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "irqbalance.service": { "name": "irqbalance.service", "source": "systemd", "state": "running", "status": "enabled" }, "kdump.service": { "name": "kdump.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "kmod-static-nodes.service": { "name": "kmod-static-nodes.service", "source": "systemd", "state": "stopped", "status": "static" }, "kvm_stat.service": { "name": "kvm_stat.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ldconfig.service": { "name": "ldconfig.service", "source": "systemd", "state": "stopped", "status": "static" }, "loadmodules.service": { "name": "loadmodules.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "man-db-cache-update.service": { "name": "man-db-cache-update.service", "source": "systemd", "state": "inactive", "status": "static" }, "man-db-restart-cache-update.service": { "name": "man-db-restart-cache-update.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "messagebus.service": { "name": "messagebus.service", "source": "systemd", "state": "active", "status": "static" }, "microcode.service": { "name": "microcode.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "modprobe@efi_pstore.service": { "name": "modprobe@efi_pstore.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "network.service": { "name": "network.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "nfs-blkmap.service": { "name": "nfs-blkmap.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-convert.service": { "name": "nfs-convert.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-idmapd.service": { "name": "nfs-idmapd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-mountd.service": { "name": "nfs-mountd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-server.service": { "name": "nfs-server.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nfs-utils.service": { "name": "nfs-utils.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfsdcld.service": { "name": "nfsdcld.service", "source": "systemd", "state": "stopped", "status": "static" }, "nftables.service": { "name": "nftables.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nis-domainname.service": { "name": "nis-domainname.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "ntpd.service": { "name": "ntpd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ntpdate.service": { "name": "ntpdate.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "oddjobd.service": { "name": "oddjobd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-halt.service": { "name": "plymouth-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-kexec.service": { "name": "plymouth-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-poweroff.service": { "name": "plymouth-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-quit-wait.service": { "name": "plymouth-quit-wait.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-quit.service": { "name": "plymouth-quit.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-read-write.service": { "name": "plymouth-read-write.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-reboot.service": { "name": "plymouth-reboot.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-start.service": { "name": "plymouth-start.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-switch-root-initramfs.service": { "name": "plymouth-switch-root-initramfs.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-switch-root.service": { "name": "plymouth-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "polkit.service": { "name": "polkit.service", "source": "systemd", "state": "running", "status": "static" }, "power-profiles-daemon.service": { "name": "power-profiles-daemon.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "qemu-guest-agent.service": { "name": "qemu-guest-agent.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "quotaon.service": { "name": "quotaon.service", "source": "systemd", "state": "inactive", "status": "static" }, "rc-local.service": { "name": "rc-local.service", "source": "systemd", "state": "stopped", "status": "static" }, "rdisc.service": { "name": "rdisc.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rescue.service": { "name": "rescue.service", "source": "systemd", "state": "stopped", "status": "static" }, "restraintd.service": { "name": "restraintd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rngd.service": { "name": "rngd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpc-gssd.service": { "name": "rpc-gssd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd-notify.service": { "name": "rpc-statd-notify.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd.service": { "name": "rpc-statd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpcbind.service": { "name": "rpcbind.service", "source": "systemd", "state": "running", "status": "enabled" }, "rsyslog.service": { "name": "rsyslog.service", "source": "systemd", "state": "running", "status": "enabled" }, "selinux-autorelabel-mark.service": { "name": "selinux-autorelabel-mark.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "selinux-autorelabel.service": { "name": "selinux-autorelabel.service", "source": "systemd", "state": "inactive", "status": "static" }, "serial-getty@.service": { "name": "serial-getty@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "snapd.seeded.service": { "name": "snapd.seeded.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sntp.service": { "name": "sntp.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sshd-keygen.service": { "name": "sshd-keygen.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sshd-keygen@.service": { "name": "sshd-keygen@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "sshd-keygen@ecdsa.service": { "name": "sshd-keygen@ecdsa.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd-keygen@ed25519.service": { "name": "sshd-keygen@ed25519.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd-keygen@rsa.service": { "name": "sshd-keygen@rsa.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd.service": { "name": "sshd.service", "source": "systemd", "state": "running", "status": "enabled" }, "sshd@.service": { "name": "sshd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "sssd-autofs.service": { "name": "sssd-autofs.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-kcm.service": { "name": "sssd-kcm.service", "source": "systemd", "state": "stopped", "status": "indirect" }, "sssd-nss.service": { "name": "sssd-nss.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-pac.service": { "name": "sssd-pac.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-pam.service": { "name": "sssd-pam.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-ssh.service": { "name": "sssd-ssh.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-sudo.service": { "name": "sssd-sudo.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd.service": { "name": "sssd.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "syslog.service": { "name": "syslog.service", "source": "systemd", "state": "active", "status": "enabled" }, "system-update-cleanup.service": { "name": "system-update-cleanup.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-ask-password-console.service": { "name": "systemd-ask-password-console.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-plymouth.service": { "name": "systemd-ask-password-plymouth.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-wall.service": { "name": "systemd-ask-password-wall.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-backlight@.service": { "name": "systemd-backlight@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-binfmt.service": { "name": "systemd-binfmt.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-coredump@.service": { "name": "systemd-coredump@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-exit.service": { "name": "systemd-exit.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-firstboot.service": { "name": "systemd-firstboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck-root.service": { "name": "systemd-fsck-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck@.service": { "name": "systemd-fsck@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-halt.service": { "name": "systemd-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hibernate-resume@.service": { "name": "systemd-hibernate-resume@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-hibernate.service": { "name": "systemd-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hostnamed.service": { "name": "systemd-hostnamed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hwdb-update.service": { "name": "systemd-hwdb-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-hybrid-sleep.service": { "name": "systemd-hybrid-sleep.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-initctl.service": { "name": "systemd-initctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-catalog-update.service": { "name": "systemd-journal-catalog-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-flush.service": { "name": "systemd-journal-flush.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journald.service": { "name": "systemd-journald.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-kexec.service": { "name": "systemd-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-localed.service": { "name": "systemd-localed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-logind.service": { "name": "systemd-logind.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-machine-id-commit.service": { "name": "systemd-machine-id-commit.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-modules-load.service": { "name": "systemd-modules-load.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-networkd-wait-online.service": { "name": "systemd-networkd-wait-online.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-portabled.service": { "name": "systemd-portabled.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-poweroff.service": { "name": "systemd-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-pstore.service": { "name": "systemd-pstore.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-quotacheck.service": { "name": "systemd-quotacheck.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-random-seed.service": { "name": "systemd-random-seed.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-reboot.service": { "name": "systemd-reboot.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-remount-fs.service": { "name": "systemd-remount-fs.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-resolved.service": { "name": "systemd-resolved.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-rfkill.service": { "name": "systemd-rfkill.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-suspend-then-hibernate.service": { "name": "systemd-suspend-then-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-suspend.service": { "name": "systemd-suspend.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-sysctl.service": { "name": "systemd-sysctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-sysusers.service": { "name": "systemd-sysusers.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-timedated.service": { "name": "systemd-timedated.service", "source": "systemd", "state": "inactive", "status": "masked" }, "systemd-timesyncd.service": { "name": "systemd-timesyncd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-tmpfiles-clean.service": { "name": "systemd-tmpfiles-clean.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup-dev.service": { "name": "systemd-tmpfiles-setup-dev.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup.service": { "name": "systemd-tmpfiles-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-settle.service": { "name": "systemd-udev-settle.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-udev-trigger.service": { "name": "systemd-udev-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udevd.service": { "name": "systemd-udevd.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-update-done.service": { "name": "systemd-update-done.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp-runlevel.service": { "name": "systemd-update-utmp-runlevel.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp.service": { "name": "systemd-update-utmp.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-user-sessions.service": { "name": "systemd-user-sessions.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-vconsole-setup.service": { "name": "systemd-vconsole-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-volatile-root.service": { "name": "systemd-volatile-root.service", "source": "systemd", "state": "inactive", "status": "static" }, "tcsd.service": { "name": "tcsd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "teamd@.service": { "name": "teamd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "timedatex.service": { "name": "timedatex.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "tlp.service": { "name": "tlp.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "tuned.service": { "name": "tuned.service", "source": "systemd", "state": "running", "status": "enabled" }, "unbound-anchor.service": { "name": "unbound-anchor.service", "source": "systemd", "state": "stopped", "status": "static" }, "user-runtime-dir@.service": { "name": "user-runtime-dir@.service", "source": "systemd", "state": "unknown", "status": "static" }, "user-runtime-dir@0.service": { "name": "user-runtime-dir@0.service", "source": "systemd", "state": "stopped", "status": "active" }, "user@.service": { "name": "user@.service", "source": "systemd", "state": "unknown", "status": "static" }, "user@0.service": { "name": "user@0.service", "source": "systemd", "state": "running", "status": "active" }, "ypbind.service": { "name": "ypbind.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "yppasswdd.service": { "name": "yppasswdd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ypserv.service": { "name": "ypserv.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ypxfrd.service": { "name": "ypxfrd.service", "source": "systemd", "state": "stopped", "status": "not-found" } } }, "changed": false } TASK [Stop ipsec service] ****************************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/cleanup.yml:11 Sunday 28 January 2024 04:56:00 +0000 (0:00:01.662) 0:00:16.110 ******** ok: [sut] => { "changed": false, "enabled": false, "name": "ipsec", "state": "stopped", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "network-online.target systemd-journald.socket sysinit.target basic.target system.slice", "AllowIsolate": "no", "AllowedCPUs": "", "AllowedMemoryNodes": "", "AmbientCapabilities": "", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "CPUAccounting": "no", "CPUAffinity": "", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "ConfigurationDirectoryMode": "0755", "Conflicts": "shutdown.target", "ControlPID": "0", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "Delegate": "no", "Description": "Internet Key Exchange (IKE) Protocol Daemon for IPsec", "DevicePolicy": "auto", "Documentation": "man:ipsec(8) man:pluto(8) man:ipsec.conf(5)", "DynamicUser": "no", "EffectiveCPUs": "", "EffectiveMemoryNodes": "", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/libexec/ipsec/pluto ; argv[]=/usr/libexec/ipsec/pluto --leak-detective --config /etc/ipsec.conf --nofork ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/usr/sbin/ipsec ; argv[]=/usr/sbin/ipsec --checknflog ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStop": "{ path=/usr/libexec/ipsec/whack ; argv[]=/usr/libexec/ipsec/whack --shutdown ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStopPost": "{ path=/usr/sbin/ipsec ; argv[]=/usr/sbin/ipsec --stopnflog ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/ipsec.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOSchedulingClass": "0", "IOSchedulingPriority": "0", "IOWeight": "[not set]", "IPAccounting": "no", "IPEgressBytes": "18446744073709551615", "IPEgressPackets": "18446744073709551615", "IPIngressBytes": "18446744073709551615", "IPIngressPackets": "18446744073709551615", "Id": "ipsec.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "0", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "262144", "LimitNOFILESoft": "1024", "LimitNPROC": "14003", "LimitNPROCSoft": "14003", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14003", "LimitSIGPENDINGSoft": "14003", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "0", "MemoryAccounting": "yes", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemorySwapMax": "infinity", "MountAPIVFS": "no", "MountFlags": "", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAMask": "", "NUMAPolicy": "n/a", "Names": "ipsec.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "all", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "Perpetual": "no", "PrivateDevices": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "sysinit.target system.slice", "Restart": "on-failure", "RestartUSec": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardInputData": "", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StateChangeTimestampMonotonic": "0", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "[not set]", "TasksMax": "22405", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "notify", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "disabled", "UtmpMode": "init", "Wants": "network-online.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "3min 20s" } } TASK [Uninstall packages] ****************************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/cleanup.yml:18 Sunday 28 January 2024 04:56:00 +0000 (0:00:00.363) 0:00:16.473 ******** changed: [sut] => (item=libreswan) => { "ansible_loop_var": "item", "changed": true, "item": "libreswan", "rc": 0, "results": [ "Removed: libreswan-4.12-2.el8.x86_64" ] } TASK [Remove ipsec.conf files] ************************************************* task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/cleanup.yml:43 Sunday 28 January 2024 04:56:04 +0000 (0:00:03.626) 0:00:20.099 ******** changed: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": true, "item": "host01.local", "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "state": "absent" } changed: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": true, "item": "host02.local", "path": "/etc/ipsec.d/mainhost.local-to-host02.local.conf", "state": "absent" } changed: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": true, "item": "sut", "path": "/etc/ipsec.d/mainhost.local-to-sut.conf", "state": "absent" } TASK [Remove ipsec.secrets files] ********************************************** task path: /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/cleanup.yml:49 Sunday 28 January 2024 04:56:05 +0000 (0:00:00.599) 0:00:20.699 ******** changed: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": true, "item": "host01.local", "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "state": "absent" } changed: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": true, "item": "host02.local", "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets", "state": "absent" } changed: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": true, "item": "sut", "path": "/etc/ipsec.d/mainhost.local-to-sut.secrets", "state": "absent" } NOTIFIED HANDLER fedora.linux_system_roles.vpn : Restart vpn service and wait for ssh conn to return for sut RUNNING HANDLER [fedora.linux_system_roles.vpn : Restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/handlers/main.yml:2 Sunday 28 January 2024 04:56:05 +0000 (0:00:00.605) 0:00:21.305 ******** included: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [fedora.linux_system_roles.vpn : Enable and restart vpn services] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 Sunday 28 January 2024 04:56:05 +0000 (0:00:00.013) 0:00:21.318 ******** changed: [sut] => (item=ipsec) => { "ansible_job_id": "j680119405810.12585", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/j680119405810.12585", "started": 1 } RUNNING HANDLER [fedora.linux_system_roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 Sunday 28 January 2024 04:56:06 +0000 (0:00:00.503) 0:00:21.822 ******** ok: [sut] => { "changed": false, "elapsed": 3 } PLAY RECAP ********************************************************************* sut : ok=48 changed=10 unreachable=0 failed=0 skipped=26 rescued=0 ignored=0 Sunday 28 January 2024 04:56:09 +0000 (0:00:03.482) 0:00:25.304 ******** =============================================================================== fedora.linux_system_roles.vpn : Ensure required packages are installed --- 4.00s /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:6 Uninstall packages ------------------------------------------------------ 3.63s /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/cleanup.yml:18 --------------------- fedora.linux_system_roles.vpn : Wait for ssh connection to return ------- 3.48s /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 fedora.linux_system_roles.vpn : Create ipsec.conf files ----------------- 1.76s /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:161 fedora.linux_system_roles.vpn : Populate service facts ------------------ 1.71s /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:3 fedora.linux_system_roles.vpn : Create ipsec.secrets files -------------- 1.67s /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:175 Get service facts ------------------------------------------------------- 1.66s /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/cleanup.yml:8 ---------------------- Gathering Facts --------------------------------------------------------- 0.80s /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:2 ------ Remove ipsec.secrets files ---------------------------------------------- 0.61s /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/cleanup.yml:49 --------------------- Remove ipsec.conf files ------------------------------------------------- 0.60s /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/cleanup.yml:43 --------------------- fedora.linux_system_roles.vpn : Check if secrets file already exists ---- 0.58s /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:169 Ensure firewalld not running if not testing firewall -------------------- 0.51s /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml:67 ------------------ fedora.linux_system_roles.vpn : Enable and restart vpn services --------- 0.50s /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 Get and store conf files ------------------------------------------------ 0.45s /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:72 ----- Stat secrets files paths ------------------------------------------------ 0.41s /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/assert_conf_secrets_files_exist.yml:8 Stat conf files paths --------------------------------------------------- 0.41s /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/assert_conf_secrets_files_exist.yml:2 Get and store secrets files --------------------------------------------- 0.38s /WORKDIR/git-weekly-cifr_x6am_/tests/tests_host_to_host_psk_custom.yml:125 ---- Stop ipsec service ------------------------------------------------------ 0.36s /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/cleanup.yml:11 --------------------- Create nss directory for testing ---------------------------------------- 0.26s /WORKDIR/git-weekly-cifr_x6am_/tests/tasks/setup_test.yml:22 ------------------ fedora.linux_system_roles.vpn : Check if system is ostree --------------- 0.26s /WORKDIR/git-weekly-cifr_x6am_/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:10 ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- [DEPRECATION WARNING]: ANSIBLE_COLLECTIONS_PATHS option, does not fit var naming standard, use the singular form ANSIBLE_COLLECTIONS_PATH instead. This feature will be removed from ansible-core in version 2.19. Deprecation warnings can be disabled by setting deprecation_warnings=False in ansible.cfg. ---^---^---^---^---^---