# STDOUT: ---v---v---v---v---v--- ansible-playbook 2.9.27 config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.9/lib/python3.9/site-packages/ansible executable location = /opt/ansible-2.9/bin/ansible-playbook python version = 3.9.18 (main, Sep 7 2023, 00:00:00) [GCC 11.4.1 20230605 (Red Hat 11.4.1-2)] Using /etc/ansible/ansible.cfg as config file Skipping callback 'actionable', as we already have a stdout callback. Skipping callback 'counter_enabled', as we already have a stdout callback. Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'full_skip', as we already have a stdout callback. Skipping callback 'json', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'null', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. Skipping callback 'selective', as we already have a stdout callback. Skipping callback 'skippy', as we already have a stdout callback. Skipping callback 'stderr', as we already have a stdout callback. Skipping callback 'unixy', as we already have a stdout callback. Skipping callback 'yaml', as we already have a stdout callback. PLAYBOOK: tests_mesh_cert.yml ************************************************** 1 plays in /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml PLAY [Test mesh tunnels with certificates] ************************************* TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:3 Sunday 28 January 2024 04:51:44 +0000 (0:00:00.012) 0:00:00.012 ******** ok: [sut] META: ran handlers TASK [Set up test environment] ************************************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:16 Sunday 28 January 2024 04:51:44 +0000 (0:00:00.508) 0:00:00.520 ******** included: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/setup_test.yml for sut TASK [Set platform/version specific variables] ********************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/setup_test.yml:2 Sunday 28 January 2024 04:51:44 +0000 (0:00:00.014) 0:00:00.535 ******** TASK [linux-system-roles.vpn : Ensure ansible_facts used by role] ************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:2 Sunday 28 January 2024 04:51:44 +0000 (0:00:00.026) 0:00:00.561 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Check if system is ostree] ********************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:11 Sunday 28 January 2024 04:51:44 +0000 (0:00:00.017) 0:00:00.579 ******** ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [linux-system-roles.vpn : Set flag to indicate system is ostree] ********** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:16 Sunday 28 January 2024 04:51:45 +0000 (0:00:00.221) 0:00:00.801 ******** ok: [sut] => { "ansible_facts": { "__vpn_is_ostree": false }, "changed": false } TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:20 Sunday 28 January 2024 04:51:45 +0000 (0:00:00.020) 0:00:00.821 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=RedHat_7.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/vars/RedHat_7.yml" ], "ansible_loop_var": "item", "changed": false, "item": "RedHat_7.yml" } skipping: [sut] => (item=RedHat_7.9.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_7.9.yml", "skip_reason": "Conditional result was False" } TASK [Change inventory_hostname] *********************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/setup_test.yml:11 Sunday 28 January 2024 04:51:45 +0000 (0:00:00.041) 0:00:00.862 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Add sample main host] **************************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/setup_test.yml:18 Sunday 28 January 2024 04:51:45 +0000 (0:00:00.019) 0:00:00.882 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create nss directory for testing] **************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/setup_test.yml:22 Sunday 28 January 2024 04:51:45 +0000 (0:00:00.025) 0:00:00.908 ******** changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 22, "state": "directory", "uid": 0 } TASK [Create /etc/ipsec.d directory for testing] ******************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/setup_test.yml:28 Sunday 28 January 2024 04:51:45 +0000 (0:00:00.208) 0:00:01.116 ******** ok: [sut] => { "changed": false, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 22, "state": "directory", "uid": 0 } TASK [Dynamically add more hosts] ********************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/setup_test.yml:34 Sunday 28 January 2024 04:51:45 +0000 (0:00:00.144) 0:00:01.261 ******** included: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/add_hosts.yml for sut TASK [Dynamically add multiple hosts for testing] ****************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/add_hosts.yml:2 Sunday 28 January 2024 04:51:45 +0000 (0:00:00.011) 0:00:01.273 ******** creating host via 'add_host': hostname=host01.local creating host via 'add_host': hostname=host02.local changed: [sut] => (item=1) => { "add_host": { "groups": [ "testing" ], "host_name": "host01.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 1 } changed: [sut] => (item=2) => { "add_host": { "groups": [ "testing" ], "host_name": "host02.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 2 } TASK [Create mock vpn_connections] ********************************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/add_hosts.yml:11 Sunday 28 January 2024 04:51:45 +0000 (0:00:00.025) 0:00:01.298 ******** ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "hosts": { "host01.local": "", "host02.local": "", "sut": "" } } ] }, "changed": false } TASK [Create sample policies directory for testing] **************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/setup_test.yml:40 Sunday 28 January 2024 04:51:45 +0000 (0:00:00.030) 0:00:01.329 ******** changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d/policies", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 120, "state": "directory", "uid": 0 } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/setup_test.yml:46 Sunday 28 January 2024 04:51:45 +0000 (0:00:00.161) 0:00:01.491 ******** changed: [sut] => { "changed": true, "dest": "/etc/ipsec.d/policies/private", "gid": 0, "group": "root", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 614, "state": "file", "uid": 0 } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/setup_test.yml:52 Sunday 28 January 2024 04:51:45 +0000 (0:00:00.145) 0:00:01.636 ******** changed: [sut] => { "changed": true, "dest": "/etc/ipsec.d/policies/private-or-clear", "gid": 0, "group": "root", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 728, "state": "file", "uid": 0 } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/setup_test.yml:58 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.146) 0:00:01.783 ******** changed: [sut] => { "changed": true, "dest": "/etc/ipsec.d/policies/clear", "gid": 0, "group": "root", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 416, "state": "file", "uid": 0 } TASK [Ensure firewalld not running if not testing firewall] ******************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/setup_test.yml:67 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.146) 0:00:01.929 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Add extra options to check] ********************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:21 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.020) 0:00:01.950 ******** ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "cert", "hosts": { "host01.local": "", "host02.local": "", "sut": "" }, "opportunistic": true, "policies": [ { "cidr": "203.0.113.0/24", "policy": "private" }, { "cidr": "198.51.100.0/24", "policy": "clear" } ] } ] }, "changed": false } TASK [Add cert_name fact to controller] **************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:36 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.022) 0:00:01.972 ******** ok: [sut] => { "ansible_facts": { "cert_name": "main_cert" }, "changed": false } TASK [Use vpn role] ************************************************************ task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:40 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.021) 0:00:01.994 ******** TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:3 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.024) 0:00:02.018 ******** included: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml for sut TASK [linux-system-roles.vpn : Ensure ansible_facts used by role] ************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:2 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.011) 0:00:02.030 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Check if system is ostree] ********************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:11 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.018) 0:00:02.048 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Set flag to indicate system is ostree] ********** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:16 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.017) 0:00:02.065 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:20 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.016) 0:00:02.082 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=RedHat_7.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/vars/RedHat_7.yml" ], "ansible_loop_var": "item", "changed": false, "item": "RedHat_7.yml" } skipping: [sut] => (item=RedHat_7.9.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_7.9.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Ensure required packages are installed] ********* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:6 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.031) 0:00:02.114 ******** ok: [sut] => { "changed": false, "rc": 0, "results": [ "iproute-4.11.0-30.el7.x86_64 providing iproute is already installed", "libreswan-3.25-9.1.el7_9.x86_64 providing libreswan is already installed" ] } lsrpackages: iproute libreswan TASK [linux-system-roles.vpn : Configure firewall] ***************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:14 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.462) 0:00:02.576 ******** included: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/firewall.yml for sut TASK [Ensure the vpn ports status with the firewall role] ********************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/firewall.yml:3 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.012) 0:00:02.589 ******** TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.036) 0:00:02.625 ******** included: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.016) 0:00:02.642 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Sunday 28 January 2024 04:51:46 +0000 (0:00:00.023) 0:00:02.665 ******** ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Sunday 28 January 2024 04:51:47 +0000 (0:00:00.209) 0:00:02.874 ******** ok: [sut] => { "ansible_facts": { "__firewall_is_ostree": false }, "changed": false } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:19 Sunday 28 January 2024 04:51:47 +0000 (0:00:00.035) 0:00:02.910 ******** ok: [sut] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Sunday 28 January 2024 04:51:47 +0000 (0:00:00.390) 0:00:03.301 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Sunday 28 January 2024 04:51:47 +0000 (0:00:00.057) 0:00:03.358 ******** skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "item": "ufw", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Sunday 28 January 2024 04:51:47 +0000 (0:00:00.039) 0:00:03.398 ******** ok: [sut] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "dbus.service polkit.service system.slice basic.target", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target network-pre.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "ebtables.service iptables.service ip6tables.service shutdown.target ipset.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "Wants": "network-pre.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Sunday 28 January 2024 04:51:48 +0000 (0:00:00.363) 0:00:03.761 ******** changed: [sut] => { "changed": true, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "dbus.service polkit.service system.slice basic.target", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target network-pre.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "ebtables.service iptables.service ipset.service ip6tables.service shutdown.target", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "Wants": "network-pre.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Sunday 28 January 2024 04:51:48 +0000 (0:00:00.754) 0:00:04.515 ******** ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python2", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Sunday 28 January 2024 04:51:48 +0000 (0:00:00.025) 0:00:04.541 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Sunday 28 January 2024 04:51:48 +0000 (0:00:00.017) 0:00:04.559 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Sunday 28 January 2024 04:51:48 +0000 (0:00:00.017) 0:00:04.576 ******** changed: [sut] => (item={'service': 'ipsec', 'state': 'enabled'}) => { "__firewall_changed": true, "ansible_loop_var": "item", "changed": true, "item": { "service": "ipsec", "state": "enabled" } } TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Sunday 28 January 2024 04:51:50 +0000 (0:00:01.321) 0:00:05.898 ******** skipping: [sut] => (item={'service': 'ipsec', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "service": "ipsec", "state": "enabled" }, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Sunday 28 January 2024 04:51:50 +0000 (0:00:00.027) 0:00:05.925 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Sunday 28 January 2024 04:51:50 +0000 (0:00:00.021) 0:00:05.946 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Sunday 28 January 2024 04:51:50 +0000 (0:00:00.017) 0:00:05.964 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Sunday 28 January 2024 04:51:50 +0000 (0:00:00.017) 0:00:05.981 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Sunday 28 January 2024 04:51:50 +0000 (0:00:00.017) 0:00:05.998 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Sunday 28 January 2024 04:51:50 +0000 (0:00:00.017) 0:00:06.016 ******** skipping: [sut] => {} TASK [linux-system-roles.vpn : Configure selinux] ****************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:17 Sunday 28 January 2024 04:51:50 +0000 (0:00:00.018) 0:00:06.035 ******** included: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/selinux.yml for sut TASK [linux-system-roles.vpn : Populate service facts] ************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:3 Sunday 28 January 2024 04:51:50 +0000 (0:00:00.014) 0:00:06.049 ******** ok: [sut] => { "ansible_facts": { "services": { "NetworkManager-dispatcher.service": { "name": "NetworkManager-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "NetworkManager-wait-online.service": { "name": "NetworkManager-wait-online.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "NetworkManager.service": { "name": "NetworkManager.service", "source": "systemd", "state": "running", "status": "enabled" }, "arp-ethers.service": { "name": "arp-ethers.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "auditd.service": { "name": "auditd.service", "source": "systemd", "state": "running", "status": "enabled" }, "auth-rpcgss-module.service": { "name": "auth-rpcgss-module.service", "source": "systemd", "state": "stopped", "status": "static" }, "autovt@.service": { "name": "autovt@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "blk-availability.service": { "name": "blk-availability.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "brandbot.service": { "name": "brandbot.service", "source": "systemd", "state": "stopped", "status": "static" }, "chrony-dnssrv@.service": { "name": "chrony-dnssrv@.service", "source": "systemd", "state": "unknown", "status": "static" }, "chrony-wait.service": { "name": "chrony-wait.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "chronyd.service": { "name": "chronyd.service", "source": "systemd", "state": "running", "status": "enabled" }, "cloud-config.service": { "name": "cloud-config.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-final.service": { "name": "cloud-final.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init-local.service": { "name": "cloud-init-local.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init.service": { "name": "cloud-init.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "console-getty.service": { "name": "console-getty.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "console-shell.service": { "name": "console-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "container-getty@.service": { "name": "container-getty@.service", "source": "systemd", "state": "unknown", "status": "static" }, "cpupower.service": { "name": "cpupower.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "crond.service": { "name": "crond.service", "source": "systemd", "state": "running", "status": "enabled" }, "dbus-org.fedoraproject.FirewallD1.service": { "name": "dbus-org.fedoraproject.FirewallD1.service", "source": "systemd", "state": "active", "status": "enabled" }, "dbus-org.freedesktop.hostname1.service": { "name": "dbus-org.freedesktop.hostname1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.import1.service": { "name": "dbus-org.freedesktop.import1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.locale1.service": { "name": "dbus-org.freedesktop.locale1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.login1.service": { "name": "dbus-org.freedesktop.login1.service", "source": "systemd", "state": "active", "status": "static" }, "dbus-org.freedesktop.machine1.service": { "name": "dbus-org.freedesktop.machine1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.nm-dispatcher.service": { "name": "dbus-org.freedesktop.nm-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus-org.freedesktop.timedate1.service": { "name": "dbus-org.freedesktop.timedate1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus.service": { "name": "dbus.service", "source": "systemd", "state": "running", "status": "static" }, "debug-shell.service": { "name": "debug-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "dracut-cmdline.service": { "name": "dracut-cmdline.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-initqueue.service": { "name": "dracut-initqueue.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-mount.service": { "name": "dracut-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-mount.service": { "name": "dracut-pre-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-pivot.service": { "name": "dracut-pre-pivot.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-trigger.service": { "name": "dracut-pre-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-udev.service": { "name": "dracut-pre-udev.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown.service": { "name": "dracut-shutdown.service", "source": "systemd", "state": "stopped", "status": "static" }, "ebtables.service": { "name": "ebtables.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "emergency.service": { "name": "emergency.service", "source": "systemd", "state": "stopped", "status": "static" }, "firewalld.service": { "name": "firewalld.service", "source": "systemd", "state": "running", "status": "enabled" }, "fstrim.service": { "name": "fstrim.service", "source": "systemd", "state": "inactive", "status": "static" }, "getty@.service": { "name": "getty@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "getty@tty1.service": { "name": "getty@tty1.service", "source": "systemd", "state": "running", "status": "unknown" }, "gssproxy.service": { "name": "gssproxy.service", "source": "systemd", "state": "running", "status": "disabled" }, "halt-local.service": { "name": "halt-local.service", "source": "systemd", "state": "inactive", "status": "static" }, "initrd-cleanup.service": { "name": "initrd-cleanup.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-parse-etc.service": { "name": "initrd-parse-etc.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-switch-root.service": { "name": "initrd-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-udevadm-cleanup-db.service": { "name": "initrd-udevadm-cleanup-db.service", "source": "systemd", "state": "stopped", "status": "static" }, "insights-client-boot.service": { "name": "insights-client-boot.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "insights-client-results.service": { "name": "insights-client-results.service", "source": "systemd", "state": "inactive", "status": "static" }, "insights-client.service": { "name": "insights-client.service", "source": "systemd", "state": "inactive", "status": "static" }, "iprdump.service": { "name": "iprdump.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprinit.service": { "name": "iprinit.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprupdate.service": { "name": "iprupdate.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ipsec.service": { "name": "ipsec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "irqbalance.service": { "name": "irqbalance.service", "source": "systemd", "state": "running", "status": "enabled" }, "kdump.service": { "name": "kdump.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "kmod-static-nodes.service": { "name": "kmod-static-nodes.service", "source": "systemd", "state": "stopped", "status": "static" }, "messagebus.service": { "name": "messagebus.service", "source": "systemd", "state": "active", "status": "static" }, "microcode.service": { "name": "microcode.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "netconsole": { "name": "netconsole", "source": "sysv", "state": "stopped", "status": "disabled" }, "network": { "name": "network", "source": "sysv", "state": "running", "status": "enabled" }, "network.service": { "name": "network.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "nfs-blkmap.service": { "name": "nfs-blkmap.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-config.service": { "name": "nfs-config.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-idmap.service": { "name": "nfs-idmap.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-idmapd.service": { "name": "nfs-idmapd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-lock.service": { "name": "nfs-lock.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-mountd.service": { "name": "nfs-mountd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-rquotad.service": { "name": "nfs-rquotad.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-secure.service": { "name": "nfs-secure.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-server.service": { "name": "nfs-server.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nfs-utils.service": { "name": "nfs-utils.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs.service": { "name": "nfs.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfslock.service": { "name": "nfslock.service", "source": "systemd", "state": "inactive", "status": "static" }, "ntpdate.service": { "name": "ntpdate.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-halt.service": { "name": "plymouth-halt.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-kexec.service": { "name": "plymouth-kexec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-poweroff.service": { "name": "plymouth-poweroff.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-quit-wait.service": { "name": "plymouth-quit-wait.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-quit.service": { "name": "plymouth-quit.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-read-write.service": { "name": "plymouth-read-write.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-reboot.service": { "name": "plymouth-reboot.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-start.service": { "name": "plymouth-start.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-switch-root.service": { "name": "plymouth-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "polkit.service": { "name": "polkit.service", "source": "systemd", "state": "running", "status": "static" }, "postfix.service": { "name": "postfix.service", "source": "systemd", "state": "running", "status": "enabled" }, "qemu-guest-agent.service": { "name": "qemu-guest-agent.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "quotaon.service": { "name": "quotaon.service", "source": "systemd", "state": "inactive", "status": "static" }, "rc-local.service": { "name": "rc-local.service", "source": "systemd", "state": "stopped", "status": "static" }, "rdisc.service": { "name": "rdisc.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rescue.service": { "name": "rescue.service", "source": "systemd", "state": "stopped", "status": "static" }, "restraintd.service": { "name": "restraintd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rhel-autorelabel-mark.service": { "name": "rhel-autorelabel-mark.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-autorelabel.service": { "name": "rhel-autorelabel.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-configure.service": { "name": "rhel-configure.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-dmesg.service": { "name": "rhel-dmesg.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-domainname.service": { "name": "rhel-domainname.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-import-state.service": { "name": "rhel-import-state.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-loadmodules.service": { "name": "rhel-loadmodules.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-readonly.service": { "name": "rhel-readonly.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhnsd": { "name": "rhnsd", "source": "sysv", "state": "running", "status": "enabled" }, "rhnsd.service": { "name": "rhnsd.service", "source": "systemd", "state": "running", "status": "unknown" }, "rhsm-facts.service": { "name": "rhsm-facts.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rhsm.service": { "name": "rhsm.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rhsmcertd.service": { "name": "rhsmcertd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rngd.service": { "name": "rngd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpc-gssd.service": { "name": "rpc-gssd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-rquotad.service": { "name": "rpc-rquotad.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rpc-statd-notify.service": { "name": "rpc-statd-notify.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd.service": { "name": "rpc-statd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpcbind.service": { "name": "rpcbind.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpcgssd.service": { "name": "rpcgssd.service", "source": "systemd", "state": "inactive", "status": "static" }, "rpcidmapd.service": { "name": "rpcidmapd.service", "source": "systemd", "state": "inactive", "status": "static" }, "rsyncd.service": { "name": "rsyncd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rsyncd@.service": { "name": "rsyncd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "rsyslog.service": { "name": "rsyslog.service", "source": "systemd", "state": "running", "status": "enabled" }, "selinux-policy-migrate-local-changes@.service": { "name": "selinux-policy-migrate-local-changes@.service", "source": "systemd", "state": "unknown", "status": "static" }, "selinux-policy-migrate-local-changes@targeted.service": { "name": "selinux-policy-migrate-local-changes@targeted.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "serial-getty@.service": { "name": "serial-getty@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "serial-getty@ttyS0.service": { "name": "serial-getty@ttyS0.service", "source": "systemd", "state": "running", "status": "unknown" }, "sshd-keygen.service": { "name": "sshd-keygen.service", "source": "systemd", "state": "stopped", "status": "static" }, "sshd.service": { "name": "sshd.service", "source": "systemd", "state": "running", "status": "enabled" }, "sshd@.service": { "name": "sshd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-ask-password-console.service": { "name": "systemd-ask-password-console.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-plymouth.service": { "name": "systemd-ask-password-plymouth.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-wall.service": { "name": "systemd-ask-password-wall.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-backlight@.service": { "name": "systemd-backlight@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-binfmt.service": { "name": "systemd-binfmt.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-bootchart.service": { "name": "systemd-bootchart.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-firstboot.service": { "name": "systemd-firstboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck-root.service": { "name": "systemd-fsck-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck@.service": { "name": "systemd-fsck@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-halt.service": { "name": "systemd-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hibernate-resume@.service": { "name": "systemd-hibernate-resume@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-hibernate.service": { "name": "systemd-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hostnamed.service": { "name": "systemd-hostnamed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hwdb-update.service": { "name": "systemd-hwdb-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-hybrid-sleep.service": { "name": "systemd-hybrid-sleep.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-importd.service": { "name": "systemd-importd.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-initctl.service": { "name": "systemd-initctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-catalog-update.service": { "name": "systemd-journal-catalog-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-flush.service": { "name": "systemd-journal-flush.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journald.service": { "name": "systemd-journald.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-kexec.service": { "name": "systemd-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-localed.service": { "name": "systemd-localed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-logind.service": { "name": "systemd-logind.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-machine-id-commit.service": { "name": "systemd-machine-id-commit.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-machined.service": { "name": "systemd-machined.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-modules-load.service": { "name": "systemd-modules-load.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-nspawn@.service": { "name": "systemd-nspawn@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "systemd-poweroff.service": { "name": "systemd-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-quotacheck.service": { "name": "systemd-quotacheck.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-random-seed.service": { "name": "systemd-random-seed.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-readahead-collect.service": { "name": "systemd-readahead-collect.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-readahead-done.service": { "name": "systemd-readahead-done.service", "source": "systemd", "state": "stopped", "status": "indirect" }, "systemd-readahead-drop.service": { "name": "systemd-readahead-drop.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "systemd-readahead-replay.service": { "name": "systemd-readahead-replay.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-reboot.service": { "name": "systemd-reboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-remount-fs.service": { "name": "systemd-remount-fs.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-rfkill@.service": { "name": "systemd-rfkill@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-shutdownd.service": { "name": "systemd-shutdownd.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-suspend.service": { "name": "systemd-suspend.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-sysctl.service": { "name": "systemd-sysctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-timedated.service": { "name": "systemd-timedated.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-tmpfiles-clean.service": { "name": "systemd-tmpfiles-clean.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup-dev.service": { "name": "systemd-tmpfiles-setup-dev.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup.service": { "name": "systemd-tmpfiles-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-settle.service": { "name": "systemd-udev-settle.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-udev-trigger.service": { "name": "systemd-udev-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udevd.service": { "name": "systemd-udevd.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-update-done.service": { "name": "systemd-update-done.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp-runlevel.service": { "name": "systemd-update-utmp-runlevel.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp.service": { "name": "systemd-update-utmp.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-user-sessions.service": { "name": "systemd-user-sessions.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-vconsole-setup.service": { "name": "systemd-vconsole-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "teamd@.service": { "name": "teamd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "tuned.service": { "name": "tuned.service", "source": "systemd", "state": "running", "status": "enabled" }, "unbound-anchor.service": { "name": "unbound-anchor.service", "source": "systemd", "state": "stopped", "status": "static" }, "wpa_supplicant.service": { "name": "wpa_supplicant.service", "source": "systemd", "state": "inactive", "status": "disabled" } } }, "changed": false } TASK [linux-system-roles.vpn : Get the ipsec tcp service ports] **************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:12 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.905) 0:00:06.955 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Initialize _vpn_selinux] ************************ task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:20 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.023) 0:00:06.979 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Add the ipsec service ports to _vpn_selinux] **** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:24 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.022) 0:00:07.001 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Ensure the service and the ports status with the selinux role] *********** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:33 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.023) 0:00:07.024 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Ensure OpenSSL is installed on the controller] *** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:27 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.023) 0:00:07.047 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Enforce default auth method as needed] ********** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:35 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.022) 0:00:07.069 ******** ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "cert", "hosts": { "host01.local": "", "host02.local": "", "sut": "" }, "opportunistic": true, "policies": [ { "cidr": "203.0.113.0/24", "policy": "private" }, { "cidr": "198.51.100.0/24", "policy": "clear" } ] } ] }, "changed": false } TASK [linux-system-roles.vpn : Make sure that the hosts list is not empty] ***** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:45 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.024) 0:00:07.093 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Make sure there is at least one pair of hosts in each connection] *** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:60 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.020) 0:00:07.114 ******** ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "cert", "hosts": { "host01.local": "", "host02.local": "", "sut": "" }, "opportunistic": true, "policies": [ { "cidr": "203.0.113.0/24", "policy": "private" }, { "cidr": "198.51.100.0/24", "policy": "clear" } ] } ] }, "changed": false } TASK [linux-system-roles.vpn : Ensure cert_names are populated when auth_method is cert] *** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:74 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.021) 0:00:07.136 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Generate PSKs or use provided shared_key_content] *** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:101 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.039) 0:00:07.176 ******** ok: [sut -> localhost] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [linux-system-roles.vpn : Set psks for hosts] ***************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:138 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.024) 0:00:07.200 ******** ok: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [linux-system-roles.vpn : Create ipsec.conf files] ************************ task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:162 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.044) 0:00:07.244 ******** TASK [linux-system-roles.vpn : Check if secrets file already exists] *********** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:170 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.022) 0:00:07.267 ******** TASK [linux-system-roles.vpn : Create ipsec.secrets files] ********************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:176 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.019) 0:00:07.286 ******** TASK [linux-system-roles.vpn : Build opportunistic configuration] ************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:186 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.017) 0:00:07.304 ******** included: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/mesh_conf.yml for sut TASK [linux-system-roles.vpn : Set current IP fact for each host] ************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/mesh_conf.yml:3 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.027) 0:00:07.332 ******** ok: [sut] => { "ansible_facts": { "current_ip": "10.31.47.124" }, "changed": false } TASK [linux-system-roles.vpn : Set IP with prefix register] ******************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/mesh_conf.yml:7 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.021) 0:00:07.354 ******** ok: [sut] => { "changed": false, "cmd": "set -euo pipefail\nip addr show | grep 10.31.47.124 | awk '{print $2}'", "delta": "0:00:00.007388", "end": "2024-01-28 04:51:51.808670", "rc": 0, "start": "2024-01-28 04:51:51.801282" } STDOUT: 10.31.47.124/22 TASK [linux-system-roles.vpn : Set net CIDR fact] ****************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/mesh_conf.yml:15 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.191) 0:00:07.545 ******** ok: [sut] => { "ansible_facts": { "current_subnet": "10.31.44.0/22" }, "changed": false } TASK [linux-system-roles.vpn : Set policies fact] ****************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/mesh_conf.yml:19 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.021) 0:00:07.567 ******** ok: [sut] => { "ansible_facts": { "policies": [ { "cidr": "203.0.113.0/24", "policy": "private" }, { "cidr": "198.51.100.0/24", "policy": "clear" } ] }, "changed": false } TASK [linux-system-roles.vpn : Apply the default policy as needed] ************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/mesh_conf.yml:23 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.022) 0:00:07.590 ******** ok: [sut -> localhost] => { "ansible_facts": { "policies": [ { "cidr": "203.0.113.0/24", "policy": "private" }, { "cidr": "198.51.100.0/24", "policy": "clear" }, { "cidr": "10.31.44.0/22", "policy": "private-or-clear" }, { "cidr": "169.254.0.0/16", "policy": "private-or-clear" } ] }, "changed": false } TASK [linux-system-roles.vpn : Write tunnel policies for each network] ********* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/mesh_conf.yml:49 Sunday 28 January 2024 04:51:51 +0000 (0:00:00.046) 0:00:07.636 ******** changed: [sut] => (item=private-or-clear) => { "ansible_loop_var": "item", "changed": true, "checksum": "a01deacf3d39f3cbb1dd98f27ef285fe5848e9cc", "dest": "/etc/ipsec.d/policies/private-or-clear", "gid": 0, "group": "root", "item": "private-or-clear", "md5sum": "8dcb5bc8da86138efbb4fe824e03f9a1", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 70, "src": "/root/.ansible/tmp/ansible-tmp-1706417511.9578671-3934-47227981091665/source", "state": "file", "uid": 0 } changed: [sut] => (item=clear) => { "ansible_loop_var": "item", "changed": true, "checksum": "b3813bc54754cc738fae6c9fd8011b7165c12da4", "dest": "/etc/ipsec.d/policies/clear", "gid": 0, "group": "root", "item": "clear", "md5sum": "e8ed4c5e8408ffcdea43aa3810fd3442", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 57, "src": "/root/.ansible/tmp/ansible-tmp-1706417512.40246-3934-265946653719876/source", "state": "file", "uid": 0 } changed: [sut] => (item=private) => { "ansible_loop_var": "item", "changed": true, "checksum": "a4789f2036166e565e40fdcea385e5ff82ad16b6", "dest": "/etc/ipsec.d/policies/private", "gid": 0, "group": "root", "item": "private", "md5sum": "8a1d49feea7237a76e10628ddc628987", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 56, "src": "/root/.ansible/tmp/ansible-tmp-1706417512.8190167-3934-34243156191449/source", "state": "file", "uid": 0 } NOTIFIED HANDLER linux-system-roles.vpn : Restart vpn service and wait for ssh conn to return for sut NOTIFIED HANDLER linux-system-roles.vpn : Restart vpn service and wait for ssh conn to return for sut NOTIFIED HANDLER linux-system-roles.vpn : Send pings to initialize mesh connections for sut NOTIFIED HANDLER linux-system-roles.vpn : Send pings to initialize mesh connections for sut TASK [linux-system-roles.vpn : Deploy opportunistic configuration to each node] *** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/mesh_conf.yml:59 Sunday 28 January 2024 04:51:53 +0000 (0:00:01.264) 0:00:08.900 ******** changed: [sut] => { "changed": true, "checksum": "433a116d6d92ed3a1793ba1a066c4f1436b58452", "dest": "/etc/ipsec.d/mesh.conf", "gid": 0, "group": "root", "md5sum": "755e302046e7ac0e477c61e07c01dfab", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 859, "src": "/root/.ansible/tmp/ansible-tmp-1706417513.219719-3960-136652142627615/source", "state": "file", "uid": 0 } RUNNING HANDLER [linux-system-roles.vpn : Restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/handlers/main.yml:2 Sunday 28 January 2024 04:51:53 +0000 (0:00:00.414) 0:00:09.315 ******** included: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [linux-system-roles.vpn : Enable and restart vpn services] ***** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:2 Sunday 28 January 2024 04:51:53 +0000 (0:00:00.013) 0:00:09.328 ******** changed: [sut] => (item=ipsec) => { "ansible_job_id": "96540754592.9922", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/96540754592.9922", "started": 1 } RUNNING HANDLER [linux-system-roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:11 Sunday 28 January 2024 04:51:54 +0000 (0:00:00.415) 0:00:09.744 ******** ok: [sut] => { "changed": false, "elapsed": 3 } RUNNING HANDLER [linux-system-roles.vpn : Send pings to initialize mesh connections] *** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/handlers/main.yml:6 Sunday 28 January 2024 04:51:57 +0000 (0:00:03.553) 0:00:13.297 ******** skipping: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": false, "item": "sut", "skip_reason": "Conditional result was False" } RUNNING HANDLER [linux-system-roles.vpn : Restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/handlers/main.yml:2 Sunday 28 January 2024 04:51:57 +0000 (0:00:00.022) 0:00:13.319 ******** included: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [linux-system-roles.vpn : Enable and restart vpn services] ***** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:2 Sunday 28 January 2024 04:51:57 +0000 (0:00:00.013) 0:00:13.333 ******** changed: [sut] => (item=ipsec) => { "ansible_job_id": "771696203596.10630", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/771696203596.10630", "started": 1 } RUNNING HANDLER [linux-system-roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:11 Sunday 28 January 2024 04:51:57 +0000 (0:00:00.360) 0:00:13.693 ******** ok: [sut] => { "changed": false, "elapsed": 3 } RUNNING HANDLER [linux-system-roles.vpn : Send pings to initialize mesh connections] *** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/handlers/main.yml:6 Sunday 28 January 2024 04:52:01 +0000 (0:00:03.469) 0:00:17.163 ******** skipping: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": false, "item": "sut", "skip_reason": "Conditional result was False" } META: ran handlers TASK [Assert file existence] *************************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:49 Sunday 28 January 2024 04:52:01 +0000 (0:00:00.025) 0:00:17.189 ******** included: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/assert_mesh_conf_exists.yml for sut TASK [Stat mesh.conf file path] ************************************************ task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/assert_mesh_conf_exists.yml:2 Sunday 28 January 2024 04:52:01 +0000 (0:00:00.019) 0:00:17.209 ******** ok: [sut] => { "changed": false, "stat": { "atime": 1706417514.2747445, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "433a116d6d92ed3a1793ba1a066c4f1436b58452", "ctime": 1706417513.5617537, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 255852865, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1706417513.4047556, "nlink": 1, "path": "/etc/ipsec.d/mesh.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 859, "uid": 0, "version": "1742319154", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Assert that mesh.conf exists] ******************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/assert_mesh_conf_exists.yml:7 Sunday 28 January 2024 04:52:01 +0000 (0:00:00.148) 0:00:17.357 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Reset success flag] ****************************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:52 Sunday 28 January 2024 04:52:01 +0000 (0:00:00.052) 0:00:17.410 ******** ok: [sut] => { "ansible_facts": { "__vpn_success": true }, "changed": false } TASK [Get and store mesh.conf file] ******************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:56 Sunday 28 January 2024 04:52:01 +0000 (0:00:00.034) 0:00:17.445 ******** ok: [sut] => { "changed": false, "content": "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", "encoding": "base64", "source": "/etc/ipsec.d/mesh.conf" } TASK [Extract content for conn private] **************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:61 Sunday 28 January 2024 04:52:01 +0000 (0:00:00.219) 0:00:17.664 ******** ok: [sut] => { "ansible_facts": { "conn_private": "conn private\n type=tunnel\n left=%defaultroute\n leftid=%fromcert\n rightid=%fromcert\n rightrsasigkey=%cert\n rightca=%same\n leftcert=main_cert\n auto=route\n right=%opportunisticgroup\n negotiationshunt=hold\n failureshunt=drop\n ikev2=insist\n keyingtries=1\n retransmit-timeout=2s" }, "changed": false } TASK [Extract content for conn private-or-clear] ******************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:68 Sunday 28 January 2024 04:52:02 +0000 (0:00:00.069) 0:00:17.733 ******** ok: [sut] => { "ansible_facts": { "conn_private_or_clear": "conn private-or-clear\n type=tunnel\n left=%defaultroute\n leftid=%fromcert\n rightid=%fromcert\n rightrsasigkey=%cert\n rightca=%same\n leftcert=main_cert\n auto=route\n right=%opportunisticgroup\n negotiationshunt=hold\n failureshunt=passthrough\n ikev2=insist\n keyingtries=1\n retransmit-timeout=2s" }, "changed": false } TASK [Extract content for conn clear] ****************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:75 Sunday 28 January 2024 04:52:02 +0000 (0:00:00.026) 0:00:17.760 ******** ok: [sut] => { "ansible_facts": { "conn_clear": "conn clear\n type=passthrough\n left=%defaultroute\n right=%group\n auto=route\n authby=never\n" }, "changed": false } TASK [Check that private section contains correct information] ***************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:82 Sunday 28 January 2024 04:52:02 +0000 (0:00:00.031) 0:00:17.791 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Assert success for private part of conf file] **************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:101 Sunday 28 January 2024 04:52:02 +0000 (0:00:00.068) 0:00:17.860 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Check that private-or-clear section contains correct information] ******** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:106 Sunday 28 January 2024 04:52:02 +0000 (0:00:00.049) 0:00:17.910 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Assert success for private or clear part of conf file] ******************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:125 Sunday 28 January 2024 04:52:02 +0000 (0:00:00.032) 0:00:17.943 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Check that clear section contains correct information] ******************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:130 Sunday 28 January 2024 04:52:02 +0000 (0:00:00.050) 0:00:17.993 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Assert success for clear part of conf file] ****************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:140 Sunday 28 January 2024 04:52:02 +0000 (0:00:00.046) 0:00:18.039 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get and store policies private file] ************************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:145 Sunday 28 January 2024 04:52:02 +0000 (0:00:00.029) 0:00:18.069 ******** ok: [sut] => { "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgoyMDMuMC4xMTMuMC8yNAo=", "encoding": "base64", "source": "/etc/ipsec.d/policies/private" } TASK [Get and store policies private or clear file] **************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:150 Sunday 28 January 2024 04:52:02 +0000 (0:00:00.178) 0:00:18.248 ******** ok: [sut] => { "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgoxMC4zMS40NC4wLzIyCjE2OS4yNTQuMC4wLzE2Cg==", "encoding": "base64", "source": "/etc/ipsec.d/policies/private-or-clear" } TASK [Get and store policies clear file] *************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:155 Sunday 28 January 2024 04:52:02 +0000 (0:00:00.146) 0:00:18.394 ******** ok: [sut] => { "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgoxOTguNTEuMTAwLjAvMjQK", "encoding": "base64", "source": "/etc/ipsec.d/policies/clear" } TASK [Check contents of policy private file] *********************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:160 Sunday 28 January 2024 04:52:02 +0000 (0:00:00.147) 0:00:18.541 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Assert success for policy private file] ********************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:167 Sunday 28 January 2024 04:52:02 +0000 (0:00:00.145) 0:00:18.686 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Check contents of policy private or clear file] ************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:172 Sunday 28 January 2024 04:52:03 +0000 (0:00:00.068) 0:00:18.755 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Assert success for policy private or clear file] ************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:181 Sunday 28 January 2024 04:52:03 +0000 (0:00:00.062) 0:00:18.817 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Check contents of policy clear file] ************************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:186 Sunday 28 January 2024 04:52:03 +0000 (0:00:00.047) 0:00:18.865 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Assert success for policy clear file] ************************************ task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:193 Sunday 28 January 2024 04:52:03 +0000 (0:00:00.036) 0:00:18.902 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Check the firewall and the selinux port status] ************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:198 Sunday 28 January 2024 04:52:03 +0000 (0:00:00.021) 0:00:18.923 ******** included: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_firewall_selinux.yml for sut TASK [Get firewall service] **************************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_firewall_selinux.yml:9 Sunday 28 January 2024 04:52:03 +0000 (0:00:00.020) 0:00:18.944 ******** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--list-services" ], "delta": "0:00:00.323414", "end": "2024-01-28 04:52:03.675711", "rc": 0, "start": "2024-01-28 04:52:03.352297" } STDOUT: dhcpv6-client ipsec ssh TASK [Ensure 'ipsec' is in the firewalld service list] ************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_firewall_selinux.yml:14 Sunday 28 January 2024 04:52:03 +0000 (0:00:00.485) 0:00:19.429 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get associated selinux ports] ******************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_firewall_selinux.yml:19 Sunday 28 January 2024 04:52:03 +0000 (0:00:00.057) 0:00:19.487 ******** ok: [sut] => { "changed": false, "cmd": "set -euo pipefail\nfirewall-cmd --info-service=ipsec | egrep \"^ +ports: +\" | sed -e \"s/ *ports: //\"", "delta": "0:00:00.300793", "end": "2024-01-28 04:52:04.220646", "rc": 0, "start": "2024-01-28 04:52:03.919853" } STDOUT: 500/udp 4500/udp TASK [Check associated selinux ports when vpn_manage_selinux is true] ********** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_firewall_selinux.yml:27 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.484) 0:00:19.972 ******** skipping: [sut] => (item=500/udp) => { "ansible_loop_var": "item", "changed": false, "item": "500/udp", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=4500/udp) => { "ansible_loop_var": "item", "changed": false, "item": "4500/udp", "skip_reason": "Conditional result was False" } TASK [Check for ansible_managed, fingerprint in generated files] *************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:201 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.041) 0:00:20.013 ******** included: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_header.yml for sut included: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_header.yml for sut included: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_header.yml for sut included: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_header.yml for sut TASK [Get file] **************************************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_header.yml:3 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.041) 0:00:20.055 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Check for presence of ansible managed header, fingerprint] *************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_header.yml:9 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.023) 0:00:20.078 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get file] **************************************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_header.yml:3 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.054) 0:00:20.133 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Check for presence of ansible managed header, fingerprint] *************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_header.yml:9 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.025) 0:00:20.159 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get file] **************************************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_header.yml:3 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.047) 0:00:20.207 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Check for presence of ansible managed header, fingerprint] *************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_header.yml:9 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.024) 0:00:20.231 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get file] **************************************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_header.yml:3 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.041) 0:00:20.272 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Check for presence of ansible managed header, fingerprint] *************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_header.yml:9 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.024) 0:00:20.297 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Cleanup] ***************************************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:213 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.053) 0:00:20.350 ******** included: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/cleanup.yml for sut TASK [Set platform/version specific variables] ********************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/cleanup.yml:2 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.038) 0:00:20.388 ******** TASK [linux-system-roles.vpn : Ensure ansible_facts used by role] ************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:2 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.021) 0:00:20.410 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Check if system is ostree] ********************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:11 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.029) 0:00:20.439 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Set flag to indicate system is ostree] ********** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:16 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.022) 0:00:20.462 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:20 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.024) 0:00:20.486 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=RedHat_7.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/vars/RedHat_7.yml" ], "ansible_loop_var": "item", "changed": false, "item": "RedHat_7.yml" } skipping: [sut] => (item=RedHat_7.9.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_7.9.yml", "skip_reason": "Conditional result was False" } TASK [Get service facts] ******************************************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/cleanup.yml:8 Sunday 28 January 2024 04:52:04 +0000 (0:00:00.044) 0:00:20.531 ******** ok: [sut] => { "ansible_facts": { "services": { "NetworkManager-dispatcher.service": { "name": "NetworkManager-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "NetworkManager-wait-online.service": { "name": "NetworkManager-wait-online.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "NetworkManager.service": { "name": "NetworkManager.service", "source": "systemd", "state": "running", "status": "enabled" }, "arp-ethers.service": { "name": "arp-ethers.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "auditd.service": { "name": "auditd.service", "source": "systemd", "state": "running", "status": "enabled" }, "auth-rpcgss-module.service": { "name": "auth-rpcgss-module.service", "source": "systemd", "state": "stopped", "status": "static" }, "autovt@.service": { "name": "autovt@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "blk-availability.service": { "name": "blk-availability.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "brandbot.service": { "name": "brandbot.service", "source": "systemd", "state": "stopped", "status": "static" }, "chrony-dnssrv@.service": { "name": "chrony-dnssrv@.service", "source": "systemd", "state": "unknown", "status": "static" }, "chrony-wait.service": { "name": "chrony-wait.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "chronyd.service": { "name": "chronyd.service", "source": "systemd", "state": "running", "status": "enabled" }, "cloud-config.service": { "name": "cloud-config.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-final.service": { "name": "cloud-final.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init-local.service": { "name": "cloud-init-local.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init.service": { "name": "cloud-init.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "console-getty.service": { "name": "console-getty.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "console-shell.service": { "name": "console-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "container-getty@.service": { "name": "container-getty@.service", "source": "systemd", "state": "unknown", "status": "static" }, "cpupower.service": { "name": "cpupower.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "crond.service": { "name": "crond.service", "source": "systemd", "state": "running", "status": "enabled" }, "dbus-org.fedoraproject.FirewallD1.service": { "name": "dbus-org.fedoraproject.FirewallD1.service", "source": "systemd", "state": "active", "status": "enabled" }, "dbus-org.freedesktop.hostname1.service": { "name": "dbus-org.freedesktop.hostname1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.import1.service": { "name": "dbus-org.freedesktop.import1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.locale1.service": { "name": "dbus-org.freedesktop.locale1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.login1.service": { "name": "dbus-org.freedesktop.login1.service", "source": "systemd", "state": "active", "status": "static" }, "dbus-org.freedesktop.machine1.service": { "name": "dbus-org.freedesktop.machine1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.nm-dispatcher.service": { "name": "dbus-org.freedesktop.nm-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus-org.freedesktop.timedate1.service": { "name": "dbus-org.freedesktop.timedate1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus.service": { "name": "dbus.service", "source": "systemd", "state": "running", "status": "static" }, "debug-shell.service": { "name": "debug-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "dracut-cmdline.service": { "name": "dracut-cmdline.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-initqueue.service": { "name": "dracut-initqueue.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-mount.service": { "name": "dracut-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-mount.service": { "name": "dracut-pre-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-pivot.service": { "name": "dracut-pre-pivot.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-trigger.service": { "name": "dracut-pre-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-udev.service": { "name": "dracut-pre-udev.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown.service": { "name": "dracut-shutdown.service", "source": "systemd", "state": "stopped", "status": "static" }, "ebtables.service": { "name": "ebtables.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "emergency.service": { "name": "emergency.service", "source": "systemd", "state": "stopped", "status": "static" }, "firewalld.service": { "name": "firewalld.service", "source": "systemd", "state": "running", "status": "enabled" }, "fstrim.service": { "name": "fstrim.service", "source": "systemd", "state": "inactive", "status": "static" }, "getty@.service": { "name": "getty@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "getty@tty1.service": { "name": "getty@tty1.service", "source": "systemd", "state": "running", "status": "unknown" }, "gssproxy.service": { "name": "gssproxy.service", "source": "systemd", "state": "running", "status": "disabled" }, "halt-local.service": { "name": "halt-local.service", "source": "systemd", "state": "inactive", "status": "static" }, "initrd-cleanup.service": { "name": "initrd-cleanup.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-parse-etc.service": { "name": "initrd-parse-etc.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-switch-root.service": { "name": "initrd-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-udevadm-cleanup-db.service": { "name": "initrd-udevadm-cleanup-db.service", "source": "systemd", "state": "stopped", "status": "static" }, "insights-client-boot.service": { "name": "insights-client-boot.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "insights-client-results.service": { "name": "insights-client-results.service", "source": "systemd", "state": "inactive", "status": "static" }, "insights-client.service": { "name": "insights-client.service", "source": "systemd", "state": "inactive", "status": "static" }, "iprdump.service": { "name": "iprdump.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprinit.service": { "name": "iprinit.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprupdate.service": { "name": "iprupdate.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ipsec.service": { "name": "ipsec.service", "source": "systemd", "state": "running", "status": "enabled" }, "irqbalance.service": { "name": "irqbalance.service", "source": "systemd", "state": "running", "status": "enabled" }, "kdump.service": { "name": "kdump.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "kmod-static-nodes.service": { "name": "kmod-static-nodes.service", "source": "systemd", "state": "stopped", "status": "static" }, "messagebus.service": { "name": "messagebus.service", "source": "systemd", "state": "active", "status": "static" }, "microcode.service": { "name": "microcode.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "netconsole": { "name": "netconsole", "source": "sysv", "state": "stopped", "status": "disabled" }, "network": { "name": "network", "source": "sysv", "state": "running", "status": "enabled" }, "network.service": { "name": "network.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "nfs-blkmap.service": { "name": "nfs-blkmap.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-config.service": { "name": "nfs-config.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-idmap.service": { "name": "nfs-idmap.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-idmapd.service": { "name": "nfs-idmapd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-lock.service": { "name": "nfs-lock.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-mountd.service": { "name": "nfs-mountd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-rquotad.service": { "name": "nfs-rquotad.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-secure.service": { "name": "nfs-secure.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-server.service": { "name": "nfs-server.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nfs-utils.service": { "name": "nfs-utils.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs.service": { "name": "nfs.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfslock.service": { "name": "nfslock.service", "source": "systemd", "state": "inactive", "status": "static" }, "ntpdate.service": { "name": "ntpdate.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-halt.service": { "name": "plymouth-halt.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-kexec.service": { "name": "plymouth-kexec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-poweroff.service": { "name": "plymouth-poweroff.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-quit-wait.service": { "name": "plymouth-quit-wait.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-quit.service": { "name": "plymouth-quit.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-read-write.service": { "name": "plymouth-read-write.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-reboot.service": { "name": "plymouth-reboot.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-start.service": { "name": "plymouth-start.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-switch-root.service": { "name": "plymouth-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "polkit.service": { "name": "polkit.service", "source": "systemd", "state": "running", "status": "static" }, "postfix.service": { "name": "postfix.service", "source": "systemd", "state": "running", "status": "enabled" }, "qemu-guest-agent.service": { "name": "qemu-guest-agent.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "quotaon.service": { "name": "quotaon.service", "source": "systemd", "state": "inactive", "status": "static" }, "rc-local.service": { "name": "rc-local.service", "source": "systemd", "state": "stopped", "status": "static" }, "rdisc.service": { "name": "rdisc.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rescue.service": { "name": "rescue.service", "source": "systemd", "state": "stopped", "status": "static" }, "restraintd.service": { "name": "restraintd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rhel-autorelabel-mark.service": { "name": "rhel-autorelabel-mark.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-autorelabel.service": { "name": "rhel-autorelabel.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-configure.service": { "name": "rhel-configure.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-dmesg.service": { "name": "rhel-dmesg.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-domainname.service": { "name": "rhel-domainname.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-import-state.service": { "name": "rhel-import-state.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-loadmodules.service": { "name": "rhel-loadmodules.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-readonly.service": { "name": "rhel-readonly.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhnsd": { "name": "rhnsd", "source": "sysv", "state": "running", "status": "enabled" }, "rhnsd.service": { "name": "rhnsd.service", "source": "systemd", "state": "running", "status": "unknown" }, "rhsm-facts.service": { "name": "rhsm-facts.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rhsm.service": { "name": "rhsm.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rhsmcertd.service": { "name": "rhsmcertd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rngd.service": { "name": "rngd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpc-gssd.service": { "name": "rpc-gssd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-rquotad.service": { "name": "rpc-rquotad.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rpc-statd-notify.service": { "name": "rpc-statd-notify.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd.service": { "name": "rpc-statd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpcbind.service": { "name": "rpcbind.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpcgssd.service": { "name": "rpcgssd.service", "source": "systemd", "state": "inactive", "status": "static" }, "rpcidmapd.service": { "name": "rpcidmapd.service", "source": "systemd", "state": "inactive", "status": "static" }, "rsyncd.service": { "name": "rsyncd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rsyncd@.service": { "name": "rsyncd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "rsyslog.service": { "name": "rsyslog.service", "source": "systemd", "state": "running", "status": "enabled" }, "selinux-policy-migrate-local-changes@.service": { "name": "selinux-policy-migrate-local-changes@.service", "source": "systemd", "state": "unknown", "status": "static" }, "selinux-policy-migrate-local-changes@targeted.service": { "name": "selinux-policy-migrate-local-changes@targeted.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "serial-getty@.service": { "name": "serial-getty@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "serial-getty@ttyS0.service": { "name": "serial-getty@ttyS0.service", "source": "systemd", "state": "running", "status": "unknown" }, "sshd-keygen.service": { "name": "sshd-keygen.service", "source": "systemd", "state": "stopped", "status": "static" }, "sshd.service": { "name": "sshd.service", "source": "systemd", "state": "running", "status": "enabled" }, "sshd@.service": { "name": "sshd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-ask-password-console.service": { "name": "systemd-ask-password-console.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-plymouth.service": { "name": "systemd-ask-password-plymouth.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-wall.service": { "name": "systemd-ask-password-wall.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-backlight@.service": { "name": "systemd-backlight@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-binfmt.service": { "name": "systemd-binfmt.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-bootchart.service": { "name": "systemd-bootchart.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-firstboot.service": { "name": "systemd-firstboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck-root.service": { "name": "systemd-fsck-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck@.service": { "name": "systemd-fsck@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-halt.service": { "name": "systemd-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hibernate-resume@.service": { "name": "systemd-hibernate-resume@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-hibernate.service": { "name": "systemd-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hostnamed.service": { "name": "systemd-hostnamed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hwdb-update.service": { "name": "systemd-hwdb-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-hybrid-sleep.service": { "name": "systemd-hybrid-sleep.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-importd.service": { "name": "systemd-importd.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-initctl.service": { "name": "systemd-initctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-catalog-update.service": { "name": "systemd-journal-catalog-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-flush.service": { "name": "systemd-journal-flush.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journald.service": { "name": "systemd-journald.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-kexec.service": { "name": "systemd-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-localed.service": { "name": "systemd-localed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-logind.service": { "name": "systemd-logind.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-machine-id-commit.service": { "name": "systemd-machine-id-commit.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-machined.service": { "name": "systemd-machined.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-modules-load.service": { "name": "systemd-modules-load.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-nspawn@.service": { "name": "systemd-nspawn@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "systemd-poweroff.service": { "name": "systemd-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-quotacheck.service": { "name": "systemd-quotacheck.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-random-seed.service": { "name": "systemd-random-seed.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-readahead-collect.service": { "name": "systemd-readahead-collect.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-readahead-done.service": { "name": "systemd-readahead-done.service", "source": "systemd", "state": "stopped", "status": "indirect" }, "systemd-readahead-drop.service": { "name": "systemd-readahead-drop.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "systemd-readahead-replay.service": { "name": "systemd-readahead-replay.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-reboot.service": { "name": "systemd-reboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-remount-fs.service": { "name": "systemd-remount-fs.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-rfkill@.service": { "name": "systemd-rfkill@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-shutdownd.service": { "name": "systemd-shutdownd.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-suspend.service": { "name": "systemd-suspend.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-sysctl.service": { "name": "systemd-sysctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-timedated.service": { "name": "systemd-timedated.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-tmpfiles-clean.service": { "name": "systemd-tmpfiles-clean.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup-dev.service": { "name": "systemd-tmpfiles-setup-dev.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup.service": { "name": "systemd-tmpfiles-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-settle.service": { "name": "systemd-udev-settle.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-udev-trigger.service": { "name": "systemd-udev-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udevd.service": { "name": "systemd-udevd.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-update-done.service": { "name": "systemd-update-done.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp-runlevel.service": { "name": "systemd-update-utmp-runlevel.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp.service": { "name": "systemd-update-utmp.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-user-sessions.service": { "name": "systemd-user-sessions.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-vconsole-setup.service": { "name": "systemd-vconsole-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "teamd@.service": { "name": "teamd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "tuned.service": { "name": "tuned.service", "source": "systemd", "state": "running", "status": "enabled" }, "unbound-anchor.service": { "name": "unbound-anchor.service", "source": "systemd", "state": "stopped", "status": "static" }, "wpa_supplicant.service": { "name": "wpa_supplicant.service", "source": "systemd", "state": "inactive", "status": "disabled" } } }, "changed": false } TASK [Stop ipsec service] ****************************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/cleanup.yml:11 Sunday 28 January 2024 04:52:05 +0000 (0:00:00.827) 0:00:21.359 ******** changed: [sut] => { "changed": true, "enabled": false, "name": "ipsec", "state": "stopped", "status": { "ActiveEnterTimestamp": "Sun 2024-01-28 04:51:58 UTC", "ActiveEnterTimestampMonotonic": "535255260", "ActiveExitTimestamp": "Sun 2024-01-28 04:51:58 UTC", "ActiveExitTimestampMonotonic": "534684868", "ActiveState": "active", "After": "systemd-journald.socket basic.target system.slice network-online.target", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sun 2024-01-28 04:51:58 UTC", "AssertTimestampMonotonic": "534749450", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sun 2024-01-28 04:51:58 UTC", "ConditionTimestampMonotonic": "534749437", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/ipsec.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "Internet Key Exchange (IKE) Protocol Daemon for IPsec", "DevicePolicy": "auto", "Documentation": "man:ipsec(8) man:pluto(8) man:ipsec.conf(5)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "10947", "ExecMainStartTimestamp": "Sun 2024-01-28 04:51:58 UTC", "ExecMainStartTimestampMonotonic": "535090277", "ExecMainStatus": "0", "ExecReload": "{ path=/usr/libexec/ipsec/whack ; argv[]=/usr/libexec/ipsec/whack --listen ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/libexec/ipsec/pluto ; argv[]=/usr/libexec/ipsec/pluto --leak-detective --config /etc/ipsec.conf --nofork ; ignore_errors=no ; start_time=[Sun 2024-01-28 04:51:58 UTC] ; stop_time=[n/a] ; pid=10947 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/usr/sbin/ipsec ; argv[]=/usr/sbin/ipsec --checknflog ; ignore_errors=no ; start_time=[Sun 2024-01-28 04:51:58 UTC] ; stop_time=[Sun 2024-01-28 04:51:58 UTC] ; pid=10934 ; code=exited ; status=0 }", "ExecStop": "{ path=/usr/libexec/ipsec/whack ; argv[]=/usr/libexec/ipsec/whack --shutdown ; ignore_errors=no ; start_time=[Sun 2024-01-28 04:51:58 UTC] ; stop_time=[Sun 2024-01-28 04:51:58 UTC] ; pid=10642 ; code=exited ; status=0 }", "ExecStopPost": "{ path=/usr/sbin/ipsec ; argv[]=/usr/sbin/ipsec --stopnflog ; ignore_errors=no ; start_time=[Sun 2024-01-28 04:51:58 UTC] ; stop_time=[Sun 2024-01-28 04:51:58 UTC] ; pid=10659 ; code=exited ; status=0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/ipsec.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "ipsec.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Sun 2024-01-28 04:51:58 UTC", "InactiveEnterTimestampMonotonic": "534743870", "InactiveExitTimestamp": "Sun 2024-01-28 04:51:58 UTC", "InactiveExitTimestampMonotonic": "534754687", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "10947", "MemoryAccounting": "no", "MemoryCurrent": "2641920", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "ipsec.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "all", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "always", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StatusText": "Startup completed.", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "5", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "notify", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-online.target", "WatchdogTimestamp": "Sun 2024-01-28 04:51:58 UTC", "WatchdogTimestampMonotonic": "535255202", "WatchdogUSec": "3min 20s" } } TASK [Uninstall packages] ****************************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/cleanup.yml:18 Sunday 28 January 2024 04:52:06 +0000 (0:00:00.396) 0:00:21.756 ******** changed: [sut] => (item=libreswan) => { "ansible_loop_var": "item", "changed": true, "changes": { "removed": [ "libreswan" ] }, "item": "libreswan", "rc": 0, "results": [ "Loaded plugins: search-disabled-repos\nResolving Dependencies\n--> Running transaction check\n---> Package libreswan.x86_64 0:3.25-9.1.el7_9 will be erased\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nRemoving:\n libreswan x86_64 3.25-9.1.el7_9 @rhel-Server 4.7 M\n\nTransaction Summary\n================================================================================\nRemove 1 Package\n\nInstalled size: 4.7 M\nDownloading packages:\nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Erasing : libreswan-3.25-9.1.el7_9.x86_64 1/1 \nwarning: /etc/ipsec.d/policies/private-or-clear saved as /etc/ipsec.d/policies/private-or-clear.rpmsave\nwarning: /etc/ipsec.d/policies/private saved as /etc/ipsec.d/policies/private.rpmsave\nwarning: /etc/ipsec.d/policies/clear saved as /etc/ipsec.d/policies/clear.rpmsave\n Verifying : libreswan-3.25-9.1.el7_9.x86_64 1/1 \n\nRemoved:\n libreswan.x86_64 0:3.25-9.1.el7_9 \n\nComplete!\n" ] } TASK [Remove ipsec.conf files] ************************************************* task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/cleanup.yml:43 Sunday 28 January 2024 04:52:07 +0000 (0:00:01.336) 0:00:23.092 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "path": "/etc/ipsec.d/sut-to-host01.local.conf", "state": "absent" } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "item": "host02.local", "path": "/etc/ipsec.d/sut-to-host02.local.conf", "state": "absent" } TASK [Remove ipsec.secrets files] ********************************************** task path: /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/cleanup.yml:49 Sunday 28 January 2024 04:52:07 +0000 (0:00:00.290) 0:00:23.383 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "path": "/etc/ipsec.d/sut-to-host01.local.secrets", "state": "absent" } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "item": "host02.local", "path": "/etc/ipsec.d/sut-to-host02.local.secrets", "state": "absent" } META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* sut : ok=84 changed=14 unreachable=0 failed=0 skipped=45 rescued=0 ignored=0 Sunday 28 January 2024 04:52:07 +0000 (0:00:00.304) 0:00:23.687 ******** =============================================================================== linux-system-roles.vpn : Wait for ssh connection to return -------------- 3.55s /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:11 linux-system-roles.vpn : Wait for ssh connection to return -------------- 3.47s /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:11 Uninstall packages ------------------------------------------------------ 1.34s /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/cleanup.yml:18 --------------------- fedora.linux_system_roles.firewall : Configure firewall ----------------- 1.32s /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 linux-system-roles.vpn : Write tunnel policies for each network --------- 1.26s /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/mesh_conf.yml:49 linux-system-roles.vpn : Populate service facts ------------------------- 0.91s /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:3 Get service facts ------------------------------------------------------- 0.83s /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/cleanup.yml:8 ---------------------- fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.75s /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Gathering Facts --------------------------------------------------------- 0.51s /WORKDIR/git-weekly-cip81c8c7d/tests/tests_mesh_cert.yml:3 -------------------- Get firewall service ---------------------------------------------------- 0.49s /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_firewall_selinux.yml:9 ------- Get associated selinux ports -------------------------------------------- 0.48s /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/check_firewall_selinux.yml:19 ------ linux-system-roles.vpn : Ensure required packages are installed --------- 0.46s /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/main.yml:6 linux-system-roles.vpn : Enable and restart vpn services ---------------- 0.42s /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:2 linux-system-roles.vpn : Deploy opportunistic configuration to each node --- 0.41s /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/mesh_conf.yml:59 Stop ipsec service ------------------------------------------------------ 0.40s /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/cleanup.yml:11 --------------------- fedora.linux_system_roles.firewall : Install firewalld ------------------ 0.39s /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:19 fedora.linux_system_roles.firewall : Unmask firewalld service ----------- 0.36s /WORKDIR/git-weekly-cip81c8c7d/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 linux-system-roles.vpn : Enable and restart vpn services ---------------- 0.36s /WORKDIR/git-weekly-cip81c8c7d/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:2 Remove ipsec.secrets files ---------------------------------------------- 0.30s /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/cleanup.yml:49 --------------------- Remove ipsec.conf files ------------------------------------------------- 0.29s /WORKDIR/git-weekly-cip81c8c7d/tests/tasks/cleanup.yml:43 --------------------- ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- [WARNING]: The value 'False' is not a valid IP address or network, passing this value to ipaddr filter might result in breaking change in future. ---^---^---^---^---^---