# STDOUT: ---v---v---v---v---v--- Using /etc/ansible/ansible.cfg as config file PLAY [all] ********************************************************************* TASK [Gathering Facts] ********************************************************* Thursday 18 August 2022 15:17:01 +0000 (0:00:00.030) 0:00:00.030 ******* ok: [sut] TASK [Set up test environment] ************************************************* Thursday 18 August 2022 15:17:02 +0000 (0:00:00.829) 0:00:00.860 ******* included: /WORKDIR/dist-git-vpn-various_improvements-U_YlyE/tests/tasks/setup_test.yml for sut TASK [Set platform/version specific variables] ********************************* Thursday 18 August 2022 15:17:02 +0000 (0:00:00.038) 0:00:00.899 ******* TASK [linux-system-roles.vpn : Ensure ansible_facts used by role] ************** Thursday 18 August 2022 15:17:02 +0000 (0:00:00.042) 0:00:00.942 ******* ok: [sut] TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** Thursday 18 August 2022 15:17:02 +0000 (0:00:00.464) 0:00:01.406 ******* skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=RedHat_8.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/dist-git-vpn-various_improvements-U_YlyE/tests/roles/linux-system-roles.vpn/vars/RedHat_8.yml" ], "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.yml" } skipping: [sut] => (item=RedHat_8.7.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.7.yml", "skip_reason": "Conditional result was False" } TASK [Change inventory_hostname] *********************************************** Thursday 18 August 2022 15:17:02 +0000 (0:00:00.087) 0:00:01.494 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [add dummy main host] ***************************************************** Thursday 18 August 2022 15:17:02 +0000 (0:00:00.049) 0:00:01.543 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create nss directory for testing] **************************************** Thursday 18 August 2022 15:17:02 +0000 (0:00:00.049) 0:00:01.593 ******* changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0 } TASK [Create /etc/ipsec.d directory for testing] ******************************* Thursday 18 August 2022 15:17:03 +0000 (0:00:00.357) 0:00:01.950 ******* ok: [sut] => { "changed": false, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0 } TASK [Dynamically add more hosts] ********************************************** Thursday 18 August 2022 15:17:03 +0000 (0:00:00.241) 0:00:02.191 ******* included: /WORKDIR/dist-git-vpn-various_improvements-U_YlyE/tests/tasks/add_hosts.yml for sut TASK [dynamically add multiple hosts for testing] ****************************** Thursday 18 August 2022 15:17:03 +0000 (0:00:00.034) 0:00:02.225 ******* changed: [sut] => (item=1) => { "add_host": { "groups": [ "testing" ], "host_name": "host01.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 1 } changed: [sut] => (item=2) => { "add_host": { "groups": [ "testing" ], "host_name": "host02.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 2 } TASK [create mock vpn_connections] ********************************************* Thursday 18 August 2022 15:17:03 +0000 (0:00:00.064) 0:00:02.290 ******* ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "hosts": { "host01.local": "", "host02.local": "", "sut": "" } } ] }, "changed": false } TASK [Create dummy policies directory for testing] ***************************** Thursday 18 August 2022 15:17:03 +0000 (0:00:00.055) 0:00:02.345 ******* changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d/policies", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0 } TASK [Create dummy policy files for testing] *********************************** Thursday 18 August 2022 15:17:03 +0000 (0:00:00.267) 0:00:02.613 ******* changed: [sut] => { "changed": true, "dest": "/etc/ipsec.d/policies/private", "gid": 0, "group": "root", "mode": "0600", "owner": "root", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 0, "state": "file", "uid": 0 } TASK [Create dummy policy files for testing] *********************************** Thursday 18 August 2022 15:17:04 +0000 (0:00:00.274) 0:00:02.887 ******* changed: [sut] => { "changed": true, "dest": "/etc/ipsec.d/policies/private-or-clear", "gid": 0, "group": "root", "mode": "0600", "owner": "root", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 0, "state": "file", "uid": 0 } TASK [Create dummy policy files for testing] *********************************** Thursday 18 August 2022 15:17:04 +0000 (0:00:00.267) 0:00:03.155 ******* changed: [sut] => { "changed": true, "dest": "/etc/ipsec.d/policies/clear", "gid": 0, "group": "root", "mode": "0600", "owner": "root", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 0, "state": "file", "uid": 0 } TASK [Add extra options to check] ********************************************** Thursday 18 August 2022 15:17:04 +0000 (0:00:00.265) 0:00:03.420 ******* ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "cert", "hosts": { "host01.local": "", "host02.local": "", "sut": "" }, "opportunistic": true, "policies": [ { "cidr": "203.0.113.0/24", "policy": "private" }, { "cidr": "198.51.100.0/24", "policy": "clear" } ] } ] }, "changed": false } TASK [add cert_name fact to controller] **************************************** Thursday 18 August 2022 15:17:04 +0000 (0:00:00.055) 0:00:03.476 ******* ok: [sut] => { "ansible_facts": { "cert_name": "main_cert" }, "changed": false } TASK [Use vpn role] ************************************************************ Thursday 18 August 2022 15:17:04 +0000 (0:00:00.049) 0:00:03.525 ******* TASK [linux-system-roles.vpn : set platform/version specific variables] ******** Thursday 18 August 2022 15:17:04 +0000 (0:00:00.058) 0:00:03.584 ******* included: /WORKDIR/dist-git-vpn-various_improvements-U_YlyE/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml for sut TASK [linux-system-roles.vpn : Ensure ansible_facts used by role] ************** Thursday 18 August 2022 15:17:04 +0000 (0:00:00.033) 0:00:03.617 ******* ok: [sut] TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** Thursday 18 August 2022 15:17:05 +0000 (0:00:00.446) 0:00:04.064 ******* skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=RedHat_8.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/dist-git-vpn-various_improvements-U_YlyE/tests/roles/linux-system-roles.vpn/vars/RedHat_8.yml" ], "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.yml" } skipping: [sut] => (item=RedHat_8.7.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.7.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Ensure required packages are installed] ********* Thursday 18 August 2022 15:17:05 +0000 (0:00:00.086) 0:00:04.151 ******* changed: [sut] => { "changed": true, "rc": 0, "results": [ "Installed: libreswan-4.5-1.el8.x86_64", "Installed: nss-tools-3.79.0-8.el8_6.x86_64", "Installed: ldns-1.7.0-21.el8.x86_64" ] } TASK [linux-system-roles.vpn : Ensure OpenSSL is installed on the controller] *** Thursday 18 August 2022 15:17:10 +0000 (0:00:04.752) 0:00:08.903 ******* fatal: [sut -> localhost]: FAILED! => { "changed": false, "cmd": "dnf install -y python3-dnf", "rc": 1, "results": [] } STDERR: Error: This command has to be run with superuser privileges (under the root user on most systems). MSG: Could not import the dnf python module using /opt/ansible-2.9/bin/python3.6 (3.6.8 (default, Mar 25 2022, 11:15:52) [GCC 8.5.0 20210514 (Red Hat 8.5.0-10)]). Please install `python3-dnf` package or ensure you have specified the correct ansible_python_interpreter. NO MORE HOSTS LEFT ************************************************************* to retry, use: --limit @/tmp/tests_mesh_cert.retry PLAY RECAP ********************************************************************* sut : ok=19 changed=7 unreachable=0 failed=1 skipped=2 rescued=0 ignored=0 Thursday 18 August 2022 15:17:11 +0000 (0:00:01.035) 0:00:09.939 ******* =============================================================================== linux-system-roles.vpn : Ensure required packages are installed --------- 4.75s linux-system-roles.vpn : Ensure OpenSSL is installed on the controller --- 1.04s Gathering Facts --------------------------------------------------------- 0.83s linux-system-roles.vpn : Ensure ansible_facts used by role -------------- 0.46s linux-system-roles.vpn : Ensure ansible_facts used by role -------------- 0.45s Create nss directory for testing ---------------------------------------- 0.36s Create dummy policy files for testing ----------------------------------- 0.27s Create dummy policy files for testing ----------------------------------- 0.27s Create dummy policies directory for testing ----------------------------- 0.27s Create dummy policy files for testing ----------------------------------- 0.27s Create /etc/ipsec.d directory for testing ------------------------------- 0.24s linux-system-roles.vpn : Set platform/version specific variables -------- 0.09s linux-system-roles.vpn : Set platform/version specific variables -------- 0.09s dynamically add multiple hosts for testing ------------------------------ 0.06s Use vpn role ------------------------------------------------------------ 0.06s create mock vpn_connections --------------------------------------------- 0.06s Add extra options to check ---------------------------------------------- 0.06s add cert_name fact to controller ---------------------------------------- 0.05s add dummy main host ----------------------------------------------------- 0.05s Change inventory_hostname ----------------------------------------------- 0.05s ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- /opt/ansible-2.9/lib/python3.6/site-packages/ansible/parsing/vault/__init__.py:44: CryptographyDeprecationWarning: Python 3.6 is no longer supported by the Python core team. Therefore, support for it is deprecated in cryptography and will be removed in a future release. from cryptography.exceptions import InvalidSignature ---^---^---^---^---^---