# STDOUT: ---v---v---v---v---v--- ansible-playbook [core 2.13.6] config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.13/lib/python3.8/site-packages/ansible ansible collection location = /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection executable location = /opt/ansible-2.13/bin/ansible-playbook python version = 3.8.13 (default, Jun 24 2022, 15:27:57) [GCC 8.5.0 20210514 (Red Hat 8.5.0-13)] jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_host_to_host_psk_custom.yml ************************************ 1 plays in /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml PLAY [Test host to host tunnel with custom PSK] ******************************** TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:2 Monday 30 January 2023 09:16:34 +0000 (0:00:00.156) 0:00:00.156 ******** ok: [sut] META: ran handlers TASK [Set up test environment] ************************************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:26 Monday 30 January 2023 09:16:42 +0000 (0:00:07.443) 0:00:07.600 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml for sut TASK [Set platform/version specific variables] ********************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:2 Monday 30 January 2023 09:16:42 +0000 (0:00:00.439) 0:00:08.039 ******** TASK [fedora.linux_system_roles.vpn : Ensure ansible_facts used by role] ******* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 Monday 30 January 2023 09:16:43 +0000 (0:00:00.321) 0:00:08.361 ******** ok: [sut] TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:7 Monday 30 January 2023 09:16:45 +0000 (0:00:02.641) 0:00:11.003 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=RedHat_8.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/RedHat_8.yml" ], "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.yml" } skipping: [sut] => (item=RedHat_8.8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.8.yml", "skip_reason": "Conditional result was False" } META: role_complete for sut TASK [Change inventory_hostname] *********************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:11 Monday 30 January 2023 09:16:47 +0000 (0:00:01.256) 0:00:12.260 ******** ok: [sut] => { "ansible_facts": { "inventory_hostname": "mainhost.local" }, "changed": false } TASK [Add sample main host] **************************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:17 Monday 30 January 2023 09:16:47 +0000 (0:00:00.461) 0:00:12.722 ******** creating host via 'add_host': hostname=mainhost.local changed: [sut] => { "add_host": { "groups": [], "host_name": "mainhost.local", "host_vars": {} }, "changed": true } TASK [Create nss directory for testing] **************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:21 Monday 30 January 2023 09:16:48 +0000 (0:00:01.085) 0:00:13.807 ******** changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0 } TASK [Create /etc/ipsec.d directory for testing] ******************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:27 Monday 30 January 2023 09:16:52 +0000 (0:00:03.730) 0:00:17.538 ******** ok: [sut] => { "changed": false, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0 } TASK [Dynamically add more hosts] ********************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:33 Monday 30 January 2023 09:16:53 +0000 (0:00:00.954) 0:00:18.492 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/add_hosts.yml for sut TASK [Dynamically add multiple hosts for testing] ****************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/add_hosts.yml:2 Monday 30 January 2023 09:16:53 +0000 (0:00:00.279) 0:00:18.772 ******** creating host via 'add_host': hostname=host01.local creating host via 'add_host': hostname=host02.local changed: [sut] => (item=1) => { "add_host": { "groups": [ "testing" ], "host_name": "host01.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 1 } changed: [sut] => (item=2) => { "add_host": { "groups": [ "testing" ], "host_name": "host02.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 2 } TASK [Create mock vpn_connections] ********************************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/add_hosts.yml:11 Monday 30 January 2023 09:16:54 +0000 (0:00:00.728) 0:00:19.501 ******** ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "hosts": { "host01.local": "", "host02.local": "", "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [Create sample policies directory for testing] **************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:39 Monday 30 January 2023 09:16:54 +0000 (0:00:00.496) 0:00:19.998 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:45 Monday 30 January 2023 09:16:55 +0000 (0:00:00.540) 0:00:20.538 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:51 Monday 30 January 2023 09:16:56 +0000 (0:00:00.757) 0:00:21.296 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:57 Monday 30 January 2023 09:16:56 +0000 (0:00:00.842) 0:00:22.139 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Add extra options to check] ********************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:29 Monday 30 January 2023 09:16:57 +0000 (0:00:00.828) 0:00:22.968 ******** ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "auto": "start", "dpdaction": "restart", "dpddelay": "30s", "dpdtimeout": "31s", "esp": "esp_string_for_testing", "hosts": { "host01.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "host02.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "mainhost.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "sut": "" }, "ike": "ike_string_for_testing", "ikelifetime": "15h", "leftupdown": "leftupdown --option=value", "retransmit_timeout": "10s", "salifetime": "16h", "shared_key_content": "shared_key_for_testing", "type": "tunnel_type_for_testing" } ] }, "changed": false } TASK [Use vpn role] ************************************************************ task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:60 Monday 30 January 2023 09:16:58 +0000 (0:00:00.639) 0:00:23.607 ******** TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:3 Monday 30 January 2023 09:16:59 +0000 (0:00:01.046) 0:00:24.654 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml for sut TASK [fedora.linux_system_roles.vpn : Ensure ansible_facts used by role] ******* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 Monday 30 January 2023 09:16:59 +0000 (0:00:00.365) 0:00:25.019 ******** ok: [sut] TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:7 Monday 30 January 2023 09:17:02 +0000 (0:00:02.585) 0:00:27.604 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=RedHat_8.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/RedHat_8.yml" ], "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.yml" } skipping: [sut] => (item=RedHat_8.8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.8.yml", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Ensure required packages are installed] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:6 Monday 30 January 2023 09:17:04 +0000 (0:00:01.926) 0:00:29.531 ******** changed: [sut] => { "changed": true, "rc": 0, "results": [ "Installed: libreswan-4.9-1.el8.x86_64", "Installed: ldns-1.7.0-21.el8.x86_64", "Installed: nss-tools-3.79.0-10.el8_6.x86_64" ] } TASK [fedora.linux_system_roles.vpn : Configure firewall] ********************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:12 Monday 30 January 2023 09:17:12 +0000 (0:00:07.772) 0:00:37.304 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/firewall.yml for sut TASK [Ensure the vpn ports status with the firewall role] ********************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/firewall.yml:3 Monday 30 January 2023 09:17:12 +0000 (0:00:00.347) 0:00:37.651 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Configure selinux] *********************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:15 Monday 30 January 2023 09:17:13 +0000 (0:00:00.695) 0:00:38.346 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml for sut TASK [fedora.linux_system_roles.vpn : Populate service facts] ****************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:3 Monday 30 January 2023 09:17:13 +0000 (0:00:00.527) 0:00:38.874 ******** ok: [sut] => { "ansible_facts": { "services": { "NetworkManager-dispatcher.service": { "name": "NetworkManager-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "NetworkManager-wait-online.service": { "name": "NetworkManager-wait-online.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "NetworkManager.service": { "name": "NetworkManager.service", "source": "systemd", "state": "running", "status": "enabled" }, "auditd.service": { "name": "auditd.service", "source": "systemd", "state": "running", "status": "enabled" }, "auth-rpcgss-module.service": { "name": "auth-rpcgss-module.service", "source": "systemd", "state": "stopped", "status": "static" }, "auto-cpufreq.service": { "name": "auto-cpufreq.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "autovt@.service": { "name": "autovt@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "chrony-dnssrv@.service": { "name": "chrony-dnssrv@.service", "source": "systemd", "state": "unknown", "status": "static" }, "chrony-wait.service": { "name": "chrony-wait.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "chronyd.service": { "name": "chronyd.service", "source": "systemd", "state": "running", "status": "enabled" }, "cloud-config.service": { "name": "cloud-config.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-final.service": { "name": "cloud-final.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init-hotplugd.service": { "name": "cloud-init-hotplugd.service", "source": "systemd", "state": "inactive", "status": "static" }, "cloud-init-local.service": { "name": "cloud-init-local.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init.service": { "name": "cloud-init.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "console-getty.service": { "name": "console-getty.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "container-getty@.service": { "name": "container-getty@.service", "source": "systemd", "state": "unknown", "status": "static" }, "cpupower.service": { "name": "cpupower.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "crond.service": { "name": "crond.service", "source": "systemd", "state": "running", "status": "enabled" }, "dbus-org.freedesktop.hostname1.service": { "name": "dbus-org.freedesktop.hostname1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.locale1.service": { "name": "dbus-org.freedesktop.locale1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.login1.service": { "name": "dbus-org.freedesktop.login1.service", "source": "systemd", "state": "active", "status": "static" }, "dbus-org.freedesktop.nm-dispatcher.service": { "name": "dbus-org.freedesktop.nm-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus-org.freedesktop.portable1.service": { "name": "dbus-org.freedesktop.portable1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.timedate1.service": { "name": "dbus-org.freedesktop.timedate1.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus.service": { "name": "dbus.service", "source": "systemd", "state": "running", "status": "static" }, "dbxtool.service": { "name": "dbxtool.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "debug-shell.service": { "name": "debug-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "display-manager.service": { "name": "display-manager.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "dnf-makecache.service": { "name": "dnf-makecache.service", "source": "systemd", "state": "stopped", "status": "static" }, "dnf-system-upgrade-cleanup.service": { "name": "dnf-system-upgrade-cleanup.service", "source": "systemd", "state": "inactive", "status": "static" }, "dnf-system-upgrade.service": { "name": "dnf-system-upgrade.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "dracut-cmdline.service": { "name": "dracut-cmdline.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-initqueue.service": { "name": "dracut-initqueue.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-mount.service": { "name": "dracut-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-mount.service": { "name": "dracut-pre-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-pivot.service": { "name": "dracut-pre-pivot.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-trigger.service": { "name": "dracut-pre-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-udev.service": { "name": "dracut-pre-udev.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown-onfailure.service": { "name": "dracut-shutdown-onfailure.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown.service": { "name": "dracut-shutdown.service", "source": "systemd", "state": "stopped", "status": "static" }, "ebtables.service": { "name": "ebtables.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "emergency.service": { "name": "emergency.service", "source": "systemd", "state": "stopped", "status": "static" }, "firewalld.service": { "name": "firewalld.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "fstrim.service": { "name": "fstrim.service", "source": "systemd", "state": "inactive", "status": "static" }, "getty@.service": { "name": "getty@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "getty@tty1.service": { "name": "getty@tty1.service", "source": "systemd", "state": "running", "status": "active" }, "grub-boot-indeterminate.service": { "name": "grub-boot-indeterminate.service", "source": "systemd", "state": "inactive", "status": "static" }, "gssproxy.service": { "name": "gssproxy.service", "source": "systemd", "state": "running", "status": "disabled" }, "halt-local.service": { "name": "halt-local.service", "source": "systemd", "state": "inactive", "status": "static" }, "hv_kvp_daemon.service": { "name": "hv_kvp_daemon.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "import-state.service": { "name": "import-state.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "initrd-cleanup.service": { "name": "initrd-cleanup.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-parse-etc.service": { "name": "initrd-parse-etc.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-switch-root.service": { "name": "initrd-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-udevadm-cleanup-db.service": { "name": "initrd-udevadm-cleanup-db.service", "source": "systemd", "state": "stopped", "status": "static" }, "insights-client-boot.service": { "name": "insights-client-boot.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "insights-client-results.service": { "name": "insights-client-results.service", "source": "systemd", "state": "inactive", "status": "static" }, "insights-client.service": { "name": "insights-client.service", "source": "systemd", "state": "inactive", "status": "static" }, "iprdump.service": { "name": "iprdump.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprinit.service": { "name": "iprinit.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprupdate.service": { "name": "iprupdate.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ipsec.service": { "name": "ipsec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "irqbalance.service": { "name": "irqbalance.service", "source": "systemd", "state": "running", "status": "enabled" }, "kdump.service": { "name": "kdump.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "kmod-static-nodes.service": { "name": "kmod-static-nodes.service", "source": "systemd", "state": "stopped", "status": "static" }, "kvm_stat.service": { "name": "kvm_stat.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ldconfig.service": { "name": "ldconfig.service", "source": "systemd", "state": "stopped", "status": "static" }, "loadmodules.service": { "name": "loadmodules.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "man-db-cache-update.service": { "name": "man-db-cache-update.service", "source": "systemd", "state": "inactive", "status": "static" }, "man-db-restart-cache-update.service": { "name": "man-db-restart-cache-update.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "messagebus.service": { "name": "messagebus.service", "source": "systemd", "state": "active", "status": "static" }, "microcode.service": { "name": "microcode.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "network.service": { "name": "network.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "nfs-blkmap.service": { "name": "nfs-blkmap.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-convert.service": { "name": "nfs-convert.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-idmapd.service": { "name": "nfs-idmapd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-mountd.service": { "name": "nfs-mountd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-server.service": { "name": "nfs-server.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nfs-utils.service": { "name": "nfs-utils.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfsdcld.service": { "name": "nfsdcld.service", "source": "systemd", "state": "stopped", "status": "static" }, "nftables.service": { "name": "nftables.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nis-domainname.service": { "name": "nis-domainname.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "ntpd.service": { "name": "ntpd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ntpdate.service": { "name": "ntpdate.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "oddjobd.service": { "name": "oddjobd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-halt.service": { "name": "plymouth-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-kexec.service": { "name": "plymouth-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-poweroff.service": { "name": "plymouth-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-quit-wait.service": { "name": "plymouth-quit-wait.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-quit.service": { "name": "plymouth-quit.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-read-write.service": { "name": "plymouth-read-write.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-reboot.service": { "name": "plymouth-reboot.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-start.service": { "name": "plymouth-start.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-switch-root-initramfs.service": { "name": "plymouth-switch-root-initramfs.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-switch-root.service": { "name": "plymouth-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "polkit.service": { "name": "polkit.service", "source": "systemd", "state": "running", "status": "static" }, "power-profiles-daemon.service": { "name": "power-profiles-daemon.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "qemu-guest-agent.service": { "name": "qemu-guest-agent.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "quotaon.service": { "name": "quotaon.service", "source": "systemd", "state": "inactive", "status": "static" }, "rc-local.service": { "name": "rc-local.service", "source": "systemd", "state": "stopped", "status": "static" }, "rdisc.service": { "name": "rdisc.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rescue.service": { "name": "rescue.service", "source": "systemd", "state": "stopped", "status": "static" }, "restraintd.service": { "name": "restraintd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rhcd.service": { "name": "rhcd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rhsm-facts.service": { "name": "rhsm-facts.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rhsm.service": { "name": "rhsm.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rhsmcertd.service": { "name": "rhsmcertd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rngd.service": { "name": "rngd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpc-gssd.service": { "name": "rpc-gssd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd-notify.service": { "name": "rpc-statd-notify.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd.service": { "name": "rpc-statd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpcbind.service": { "name": "rpcbind.service", "source": "systemd", "state": "running", "status": "enabled" }, "rsyslog.service": { "name": "rsyslog.service", "source": "systemd", "state": "running", "status": "enabled" }, "selinux-autorelabel-mark.service": { "name": "selinux-autorelabel-mark.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "selinux-autorelabel.service": { "name": "selinux-autorelabel.service", "source": "systemd", "state": "inactive", "status": "static" }, "serial-getty@.service": { "name": "serial-getty@.service", "source": "systemd", "state": "unknown", "status": "indirect" }, "serial-getty@ttyS0.service": { "name": "serial-getty@ttyS0.service", "source": "systemd", "state": "running", "status": "active" }, "snapd.seeded.service": { "name": "snapd.seeded.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sntp.service": { "name": "sntp.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sshd-keygen.service": { "name": "sshd-keygen.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sshd-keygen@.service": { "name": "sshd-keygen@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "sshd-keygen@ecdsa.service": { "name": "sshd-keygen@ecdsa.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd-keygen@ed25519.service": { "name": "sshd-keygen@ed25519.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd-keygen@rsa.service": { "name": "sshd-keygen@rsa.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd.service": { "name": "sshd.service", "source": "systemd", "state": "running", "status": "enabled" }, "sshd@.service": { "name": "sshd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "sssd-autofs.service": { "name": "sssd-autofs.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-kcm.service": { "name": "sssd-kcm.service", "source": "systemd", "state": "stopped", "status": "indirect" }, "sssd-nss.service": { "name": "sssd-nss.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-pac.service": { "name": "sssd-pac.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-pam.service": { "name": "sssd-pam.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-ssh.service": { "name": "sssd-ssh.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-sudo.service": { "name": "sssd-sudo.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd.service": { "name": "sssd.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "syslog.service": { "name": "syslog.service", "source": "systemd", "state": "active", "status": "enabled" }, "system-update-cleanup.service": { "name": "system-update-cleanup.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-ask-password-console.service": { "name": "systemd-ask-password-console.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-plymouth.service": { "name": "systemd-ask-password-plymouth.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-wall.service": { "name": "systemd-ask-password-wall.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-backlight@.service": { "name": "systemd-backlight@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-binfmt.service": { "name": "systemd-binfmt.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-coredump@.service": { "name": "systemd-coredump@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-exit.service": { "name": "systemd-exit.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-firstboot.service": { "name": "systemd-firstboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck-root.service": { "name": "systemd-fsck-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck@.service": { "name": "systemd-fsck@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-halt.service": { "name": "systemd-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hibernate-resume@.service": { "name": "systemd-hibernate-resume@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-hibernate.service": { "name": "systemd-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hostnamed.service": { "name": "systemd-hostnamed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hwdb-update.service": { "name": "systemd-hwdb-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-hybrid-sleep.service": { "name": "systemd-hybrid-sleep.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-initctl.service": { "name": "systemd-initctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-catalog-update.service": { "name": "systemd-journal-catalog-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-flush.service": { "name": "systemd-journal-flush.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journald.service": { "name": "systemd-journald.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-kexec.service": { "name": "systemd-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-localed.service": { "name": "systemd-localed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-logind.service": { "name": "systemd-logind.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-machine-id-commit.service": { "name": "systemd-machine-id-commit.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-modules-load.service": { "name": "systemd-modules-load.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-networkd-wait-online.service": { "name": "systemd-networkd-wait-online.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-portabled.service": { "name": "systemd-portabled.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-poweroff.service": { "name": "systemd-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-quotacheck.service": { "name": "systemd-quotacheck.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-random-seed.service": { "name": "systemd-random-seed.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-reboot.service": { "name": "systemd-reboot.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-remount-fs.service": { "name": "systemd-remount-fs.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-resolved.service": { "name": "systemd-resolved.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-rfkill.service": { "name": "systemd-rfkill.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-suspend-then-hibernate.service": { "name": "systemd-suspend-then-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-suspend.service": { "name": "systemd-suspend.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-sysctl.service": { "name": "systemd-sysctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-sysusers.service": { "name": "systemd-sysusers.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-timedated.service": { "name": "systemd-timedated.service", "source": "systemd", "state": "inactive", "status": "masked" }, "systemd-timesyncd.service": { "name": "systemd-timesyncd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-tmpfiles-clean.service": { "name": "systemd-tmpfiles-clean.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup-dev.service": { "name": "systemd-tmpfiles-setup-dev.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup.service": { "name": "systemd-tmpfiles-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-settle.service": { "name": "systemd-udev-settle.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-udev-trigger.service": { "name": "systemd-udev-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udevd.service": { "name": "systemd-udevd.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-update-done.service": { "name": "systemd-update-done.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp-runlevel.service": { "name": "systemd-update-utmp-runlevel.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp.service": { "name": "systemd-update-utmp.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-user-sessions.service": { "name": "systemd-user-sessions.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-vconsole-setup.service": { "name": "systemd-vconsole-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-volatile-root.service": { "name": "systemd-volatile-root.service", "source": "systemd", "state": "inactive", "status": "static" }, "tcsd.service": { "name": "tcsd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "teamd@.service": { "name": "teamd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "timedatex.service": { "name": "timedatex.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "tlp.service": { "name": "tlp.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "tuned.service": { "name": "tuned.service", "source": "systemd", "state": "running", "status": "enabled" }, "unbound-anchor.service": { "name": "unbound-anchor.service", "source": "systemd", "state": "stopped", "status": "static" }, "user-runtime-dir@.service": { "name": "user-runtime-dir@.service", "source": "systemd", "state": "unknown", "status": "static" }, "user-runtime-dir@0.service": { "name": "user-runtime-dir@0.service", "source": "systemd", "state": "stopped", "status": "active" }, "user@.service": { "name": "user@.service", "source": "systemd", "state": "unknown", "status": "static" }, "user@0.service": { "name": "user@0.service", "source": "systemd", "state": "running", "status": "active" }, "ypbind.service": { "name": "ypbind.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "yppasswdd.service": { "name": "yppasswdd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ypserv.service": { "name": "ypserv.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ypxfrd.service": { "name": "ypxfrd.service", "source": "systemd", "state": "stopped", "status": "not-found" } } }, "changed": false } TASK [fedora.linux_system_roles.vpn : Get the ipsec tcp service ports] ********* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:12 Monday 30 January 2023 09:17:18 +0000 (0:00:05.305) 0:00:44.180 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Initialize _vpn_selinux] ***************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:20 Monday 30 January 2023 09:17:19 +0000 (0:00:00.668) 0:00:44.848 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Add the ipsec service ports to _vpn_selinux] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:24 Monday 30 January 2023 09:17:20 +0000 (0:00:00.913) 0:00:45.762 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Ensure the service and the ports status with the selinux role] *********** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:31 Monday 30 January 2023 09:17:21 +0000 (0:00:01.100) 0:00:46.862 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Ensure OpenSSL is installed on the controller] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:25 Monday 30 January 2023 09:17:22 +0000 (0:00:01.233) 0:00:48.096 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Enforce default auth method as needed] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:33 Monday 30 January 2023 09:17:24 +0000 (0:00:01.453) 0:00:49.549 ******** ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "psk", "auto": "start", "dpdaction": "restart", "dpddelay": "30s", "dpdtimeout": "31s", "esp": "esp_string_for_testing", "hosts": { "host01.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "host02.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "mainhost.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "sut": "" }, "ike": "ike_string_for_testing", "ikelifetime": "15h", "leftupdown": "leftupdown --option=value", "retransmit_timeout": "10s", "salifetime": "16h", "shared_key_content": "shared_key_for_testing", "type": "tunnel_type_for_testing" } ] }, "changed": false } TASK [fedora.linux_system_roles.vpn : Make sure that the hosts list is not empty] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:43 Monday 30 January 2023 09:17:27 +0000 (0:00:03.054) 0:00:52.604 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Make sure there is at least one pair of hosts in each connection] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:58 Monday 30 January 2023 09:17:28 +0000 (0:00:01.293) 0:00:53.897 ******** ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "psk", "auto": "start", "dpdaction": "restart", "dpddelay": "30s", "dpdtimeout": "31s", "esp": "esp_string_for_testing", "hosts": { "host01.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "host02.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "mainhost.local": { "leftid": "leftid_for_testing", "rightid": "rightid_for_testing" }, "sut": "" }, "ike": "ike_string_for_testing", "ikelifetime": "15h", "leftupdown": "leftupdown --option=value", "retransmit_timeout": "10s", "salifetime": "16h", "shared_key_content": "shared_key_for_testing", "type": "tunnel_type_for_testing" } ] }, "changed": false } TASK [fedora.linux_system_roles.vpn : Ensure cert_names are populated when auth_method is cert] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:72 Monday 30 January 2023 09:17:30 +0000 (0:00:01.661) 0:00:55.558 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Generate PSKs or use provided shared_key_content] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:99 Monday 30 January 2023 09:17:32 +0000 (0:00:01.876) 0:00:57.435 ******** ok: [sut -> localhost] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [fedora.linux_system_roles.vpn : Set psks for hosts] ********************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:136 Monday 30 January 2023 09:17:33 +0000 (0:00:01.575) 0:00:59.011 ******** ok: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [fedora.linux_system_roles.vpn : Create ipsec.conf files] ***************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:160 Monday 30 January 2023 09:17:36 +0000 (0:00:02.354) 0:01:01.365 ******** changed: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": true, "checksum": "5548de9a6ca5ceb221ed78759cfd24d33b73abeb", "dest": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "gid": 0, "group": "root", "item": "host01.local", "md5sum": "6f8be36a518fdb1df9b1b8cf6f1a0c39", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 447, "src": "/root/.ansible/tmp/ansible-tmp-1675070257.5745325-4972-101496208041226/source", "state": "file", "uid": 0 } changed: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": true, "checksum": "6205a9776734ace683025a5a3c281111c7519559", "dest": "/etc/ipsec.d/mainhost.local-to-host02.local.conf", "gid": 0, "group": "root", "item": "host02.local", "md5sum": "ee3f70fc92e7feb2fd72fc76255e3db6", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 447, "src": "/root/.ansible/tmp/ansible-tmp-1675070270.7301683-4972-255008837045646/source", "state": "file", "uid": 0 } changed: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": true, "checksum": "ee2b8e9b892a23e2616696c3581f2dbf1cebe519", "dest": "/etc/ipsec.d/mainhost.local-to-sut.conf", "gid": 0, "group": "root", "item": "sut", "md5sum": "ba4d375bc276a23fe22695b5bfc9e6b2", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 436, "src": "/root/.ansible/tmp/ansible-tmp-1675070276.4114513-4972-140547018799980/source", "state": "file", "uid": 0 } NOTIFIED HANDLER fedora.linux_system_roles.vpn : Restart vpn service and wait for ssh conn to return for sut NOTIFIED HANDLER fedora.linux_system_roles.vpn : Restart vpn service and wait for ssh conn to return for sut TASK [fedora.linux_system_roles.vpn : Check if secrets file already exists] **** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:168 Monday 30 January 2023 09:18:01 +0000 (0:00:25.681) 0:01:27.047 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "exists": false } } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "item": "host02.local", "stat": { "exists": false } } ok: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": false, "item": "sut", "stat": { "exists": false } } TASK [fedora.linux_system_roles.vpn : Create ipsec.secrets files] ************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:174 Monday 30 January 2023 09:18:06 +0000 (0:00:04.269) 0:01:31.317 ******** changed: [sut] => (item={'changed': False, 'stat': {'exists': False}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "22c220a0418ac1d437680bb44f9f744c3eda51a0", "dest": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "stat": { "exists": false } }, "md5sum": "96bc074a63c7df2035dde05852c94b64", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 94, "src": "/root/.ansible/tmp/ansible-tmp-1675070287.3085248-5055-88599655771957/source", "state": "file", "uid": 0 } changed: [sut] => (item={'changed': False, 'stat': {'exists': False}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "22c220a0418ac1d437680bb44f9f744c3eda51a0", "dest": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" } }, "item": "host02.local", "stat": { "exists": false } }, "md5sum": "96bc074a63c7df2035dde05852c94b64", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 94, "src": "/root/.ansible/tmp/ansible-tmp-1675070292.785637-5055-64631382769584/source", "state": "file", "uid": 0 } changed: [sut] => (item={'changed': False, 'stat': {'exists': False}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-sut.secrets', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'sut', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "7fa4eb6daec1696ef492939e130511128e812e91", "dest": "/etc/ipsec.d/mainhost.local-to-sut.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-sut.secrets" } }, "item": "sut", "stat": { "exists": false } }, "md5sum": "578d62dd0a7f093d761f567f33b5e804", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 85, "src": "/root/.ansible/tmp/ansible-tmp-1675070297.1397462-5055-204105445224016/source", "state": "file", "uid": 0 } TASK [fedora.linux_system_roles.vpn : Build opportunistic configuration] ******* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:184 Monday 30 January 2023 09:18:22 +0000 (0:00:16.749) 0:01:48.067 ******** skipping: [sut] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } skipping: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } META: role_complete for sut TASK [Assert file existence] *************************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:65 Monday 30 January 2023 09:18:24 +0000 (0:00:01.635) 0:01:49.703 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/assert_conf_secrets_files_exist.yml for sut TASK [Stat conf files paths] *************************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/assert_conf_secrets_files_exist.yml:2 Monday 30 January 2023 09:18:25 +0000 (0:00:01.200) 0:01:50.904 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "atime": 1675070269.6652718, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "5548de9a6ca5ceb221ed78759cfd24d33b73abeb", "ctime": 1675070269.6702716, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 813695175, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1675070265.2293358, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 447, "uid": 0, "version": "3721009079", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "item": "host02.local", "stat": { "atime": 1675070274.880196, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "6205a9776734ace683025a5a3c281111c7519559", "ctime": 1675070274.885196, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 838861125, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1675070273.7772121, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 447, "uid": 0, "version": "3956516943", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Stat secrets files paths] ************************************************ task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/assert_conf_secrets_files_exist.yml:8 Monday 30 January 2023 09:18:28 +0000 (0:00:02.866) 0:01:53.770 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "atime": 1675070291.8219502, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "22c220a0418ac1d437680bb44f9f744c3eda51a0", "ctime": 1675070291.8319502, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 67109125, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1675070290.7229662, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 94, "uid": 0, "version": "578863512", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "item": "host02.local", "stat": { "atime": 1675070296.0108895, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "22c220a0418ac1d437680bb44f9f744c3eda51a0", "ctime": 1675070296.0208893, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 92275077, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1675070294.6829088, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 94, "uid": 0, "version": "3119096181", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Assert that ipsec.conf and secrets files exist] ************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/assert_conf_secrets_files_exist.yml:14 Monday 30 January 2023 09:18:31 +0000 (0:00:03.265) 0:01:57.036 ******** ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'mode': '0644', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 447, 'inode': 813695175, 'dev': 51715, 'nlink': 1, 'atime': 1675070269.6652718, 'mtime': 1675070265.2293358, 'ctime': 1675070269.6702716, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': True, 'xgrp': False, 'woth': False, 'roth': True, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': '5548de9a6ca5ceb221ed78759cfd24d33b73abeb', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '3721009079', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } }, "item": "host01.local", "stat": { "atime": 1675070269.6652718, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "5548de9a6ca5ceb221ed78759cfd24d33b73abeb", "ctime": 1675070269.6702716, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 813695175, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1675070265.2293358, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 447, "uid": 0, "version": "3721009079", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host02.local.conf', 'mode': '0644', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 447, 'inode': 838861125, 'dev': 51715, 'nlink': 1, 'atime': 1675070274.880196, 'mtime': 1675070273.7772121, 'ctime': 1675070274.885196, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': True, 'xgrp': False, 'woth': False, 'roth': True, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': '6205a9776734ace683025a5a3c281111c7519559', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '3956516943', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host02.local.conf', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.conf" } }, "item": "host02.local", "stat": { "atime": 1675070274.880196, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "6205a9776734ace683025a5a3c281111c7519559", "ctime": 1675070274.885196, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 838861125, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1675070273.7772121, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 447, "uid": 0, "version": "3956516943", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed TASK [Assert that ipsec.conf and secrets files exist] ************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/assert_conf_secrets_files_exist.yml:20 Monday 30 January 2023 09:18:35 +0000 (0:00:03.386) 0:02:00.422 ******** ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'mode': '0600', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 94, 'inode': 67109125, 'dev': 51715, 'nlink': 1, 'atime': 1675070291.8219502, 'mtime': 1675070290.7229662, 'ctime': 1675070291.8319502, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': False, 'xgrp': False, 'woth': False, 'roth': False, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': '22c220a0418ac1d437680bb44f9f744c3eda51a0', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '578863512', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "stat": { "atime": 1675070291.8219502, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "22c220a0418ac1d437680bb44f9f744c3eda51a0", "ctime": 1675070291.8319502, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 67109125, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1675070290.7229662, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 94, "uid": 0, "version": "578863512", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets', 'mode': '0600', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 94, 'inode': 92275077, 'dev': 51715, 'nlink': 1, 'atime': 1675070296.0108895, 'mtime': 1675070294.6829088, 'ctime': 1675070296.0208893, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': False, 'xgrp': False, 'woth': False, 'roth': False, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': '22c220a0418ac1d437680bb44f9f744c3eda51a0', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '3119096181', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" } }, "item": "host02.local", "stat": { "atime": 1675070296.0108895, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "22c220a0418ac1d437680bb44f9f744c3eda51a0", "ctime": 1675070296.0208893, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 92275077, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1675070294.6829088, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 94, "uid": 0, "version": "3119096181", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed TASK [Reset success flag] ****************************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:68 Monday 30 January 2023 09:18:37 +0000 (0:00:02.024) 0:02:02.447 ******** ok: [sut] => { "ansible_facts": { "__vpn_success": true }, "changed": false } TASK [Get and store conf files] ************************************************ task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:72 Monday 30 January 2023 09:18:38 +0000 (0:00:00.996) 0:02:03.443 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "content": "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", "encoding": "base64", "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCmNvbm4gbWFpbmhvc3QubG9jYWwtdG8taG9zdDAyLmxvY2FsCiAgbGVmdD1tYWluaG9zdC5sb2NhbAogIGxlZnRpZD1AbGVmdGlkX2Zvcl90ZXN0aW5nCiAgcmlnaHQ9aG9zdDAyLmxvY2FsCiAgcmlnaHRpZD1AcmlnaHRpZF9mb3JfdGVzdGluZwogIGlrZXYyPWluc2lzdAogIGF1dG89c3RhcnQKICBkcGRhY3Rpb249cmVzdGFydAogIGRwZGRlbGF5PTMwcwogIGRwZHRpbWVvdXQ9MzFzCiAgZXNwPWVzcF9zdHJpbmdfZm9yX3Rlc3RpbmcKICBpa2U9aWtlX3N0cmluZ19mb3JfdGVzdGluZwogIGlrZWxpZmV0aW1lPTE1aAogIGxlZnR1cGRvd249ImxlZnR1cGRvd24gLS1vcHRpb249dmFsdWUiCiAgcmV0cmFuc21pdC10aW1lb3V0PTEwcwogIHNhbGlmZXRpbWU9MTZoCiAgdHlwZT10dW5uZWxfdHlwZV9mb3JfdGVzdGluZwogIGF1dGhieT1zZWNyZXQK", "encoding": "base64", "item": "host02.local", "source": "/etc/ipsec.d/mainhost.local-to-host02.local.conf" } TASK [Check that conf file contains correct information] *********************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:78 Monday 30 January 2023 09:18:47 +0000 (0:00:08.901) 0:02:12.345 ******** skipping: [sut] => (item={'content': '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', 'source': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host01.local.conf'}}, 'failed': False, 'changed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "idx": 0, "item": { "ansible_loop_var": "item", "changed": false, "content": "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", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } }, "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'content': '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', 'source': '/etc/ipsec.d/mainhost.local-to-host02.local.conf', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host02.local.conf'}}, 'failed': False, 'changed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "idx": 1, "item": { "ansible_loop_var": "item", "changed": false, "content": "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", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host02.local.conf" } }, "item": "host02.local", "source": "/etc/ipsec.d/mainhost.local-to-host02.local.conf" }, "skip_reason": "Conditional result was False" } TASK [Assert success for conf files] ******************************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:120 Monday 30 January 2023 09:18:50 +0000 (0:00:02.946) 0:02:15.292 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get and store secrets files] ********************************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:125 Monday 30 January 2023 09:18:51 +0000 (0:00:01.449) 0:02:16.742 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCkBsZWZ0aWRfZm9yX3Rlc3RpbmcgQHJpZ2h0aWRfZm9yX3Rlc3RpbmcgOiBQU0sgInNoYXJlZF9rZXlfZm9yX3Rlc3RpbmciCg==", "encoding": "base64", "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCkBsZWZ0aWRfZm9yX3Rlc3RpbmcgQHJpZ2h0aWRfZm9yX3Rlc3RpbmcgOiBQU0sgInNoYXJlZF9rZXlfZm9yX3Rlc3RpbmciCg==", "encoding": "base64", "item": "host02.local", "source": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" } TASK [Check that secrets file contains correct information] ******************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:131 Monday 30 January 2023 09:18:54 +0000 (0:00:02.980) 0:02:19.722 ******** skipping: [sut] => (item={'content': 'IwojIEFuc2libGUgbWFuYWdlZAojCkBsZWZ0aWRfZm9yX3Rlc3RpbmcgQHJpZ2h0aWRfZm9yX3Rlc3RpbmcgOiBQU0sgInNoYXJlZF9rZXlfZm9yX3Rlc3RpbmciCg==', 'source': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets'}}, 'failed': False, 'changed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "idx": 0, "item": { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCkBsZWZ0aWRfZm9yX3Rlc3RpbmcgQHJpZ2h0aWRfZm9yX3Rlc3RpbmcgOiBQU0sgInNoYXJlZF9rZXlfZm9yX3Rlc3RpbmciCg==", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'content': 'IwojIEFuc2libGUgbWFuYWdlZAojCkBsZWZ0aWRfZm9yX3Rlc3RpbmcgQHJpZ2h0aWRfZm9yX3Rlc3RpbmcgOiBQU0sgInNoYXJlZF9rZXlfZm9yX3Rlc3RpbmciCg==', 'source': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets'}}, 'failed': False, 'changed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "idx": 1, "item": { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCkBsZWZ0aWRfZm9yX3Rlc3RpbmcgQHJpZ2h0aWRfZm9yX3Rlc3RpbmcgOiBQU0sgInNoYXJlZF9rZXlfZm9yX3Rlc3RpbmciCg==", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" } }, "item": "host02.local", "source": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" }, "skip_reason": "Conditional result was False" } TASK [Assert success for secrets files] **************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:143 Monday 30 January 2023 09:18:56 +0000 (0:00:01.932) 0:02:21.676 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Check the firewall and the selinux port status] ************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:148 Monday 30 January 2023 09:18:58 +0000 (0:00:01.933) 0:02:23.610 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/check_firewall_selinux.yml for sut TASK [Get firewall service] **************************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/check_firewall_selinux.yml:9 Monday 30 January 2023 09:18:59 +0000 (0:00:01.481) 0:02:25.092 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Ensure 'ipsec' is in the firewalld service list] ************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/check_firewall_selinux.yml:14 Monday 30 January 2023 09:19:00 +0000 (0:00:00.849) 0:02:25.941 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Get associated selinux ports] ******************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/check_firewall_selinux.yml:19 Monday 30 January 2023 09:19:01 +0000 (0:00:00.824) 0:02:26.766 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Check associated selinux ports when vpn_manage_selinux is true] ********** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/check_firewall_selinux.yml:27 Monday 30 January 2023 09:19:02 +0000 (0:00:00.796) 0:02:27.563 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } RUNNING HANDLER [fedora.linux_system_roles.vpn : Restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/handlers/main.yml:2 Monday 30 January 2023 09:19:03 +0000 (0:00:00.747) 0:02:28.310 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [fedora.linux_system_roles.vpn : Enable and restart vpn services] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 Monday 30 January 2023 09:19:03 +0000 (0:00:00.666) 0:02:28.977 ******** changed: [sut] => (item=ipsec) => { "ansible_job_id": "844156033379.7239", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/844156033379.7239", "started": 1 } RUNNING HANDLER [fedora.linux_system_roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 Monday 30 January 2023 09:19:19 +0000 (0:00:15.357) 0:02:44.335 ******** ok: [sut] => { "changed": false, "elapsed": 12 } RUNNING HANDLER [fedora.linux_system_roles.vpn : Restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/handlers/main.yml:2 Monday 30 January 2023 09:19:32 +0000 (0:00:13.058) 0:02:57.393 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [fedora.linux_system_roles.vpn : Enable and restart vpn services] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 Monday 30 January 2023 09:19:33 +0000 (0:00:01.081) 0:02:58.474 ******** changed: [sut] => (item=ipsec) => { "ansible_job_id": "205585473598.7466", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/205585473598.7466", "started": 1 } RUNNING HANDLER [fedora.linux_system_roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 Monday 30 January 2023 09:19:38 +0000 (0:00:05.520) 0:03:03.995 ******** ok: [sut] => { "changed": false, "elapsed": 5 } META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* sut : ok=43 changed=8 unreachable=0 failed=0 skipped=19 rescued=0 ignored=0 Monday 30 January 2023 09:19:45 +0000 (0:00:07.022) 0:03:11.018 ******** =============================================================================== fedora.linux_system_roles.vpn : Create ipsec.conf files ---------------- 25.68s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:160 fedora.linux_system_roles.vpn : Create ipsec.secrets files ------------- 16.75s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:174 fedora.linux_system_roles.vpn : Enable and restart vpn services -------- 15.36s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 fedora.linux_system_roles.vpn : Wait for ssh connection to return ------ 13.06s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 Get and store conf files ------------------------------------------------ 8.86s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:72 fedora.linux_system_roles.vpn : Ensure required packages are installed --- 7.77s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:6 Gathering Facts --------------------------------------------------------- 7.44s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:2 fedora.linux_system_roles.vpn : Wait for ssh connection to return ------- 7.02s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 fedora.linux_system_roles.vpn : Enable and restart vpn services --------- 5.52s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 fedora.linux_system_roles.vpn : Populate service facts ------------------ 5.31s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:3 fedora.linux_system_roles.vpn : Check if secrets file already exists ---- 4.27s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:168 Create nss directory for testing ---------------------------------------- 3.73s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:21 -------- Assert that ipsec.conf and secrets files exist -------------------------- 3.39s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/assert_conf_secrets_files_exist.yml:14 Stat secrets files paths ------------------------------------------------ 3.27s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/assert_conf_secrets_files_exist.yml:8 fedora.linux_system_roles.vpn : Enforce default auth method as needed --- 3.05s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:33 Get and store secrets files --------------------------------------------- 2.98s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:125 Check that conf file contains correct information ----------------------- 2.95s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_host_to_host_psk_custom.yml:78 Stat conf files paths --------------------------------------------------- 2.87s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/assert_conf_secrets_files_exist.yml:2 fedora.linux_system_roles.vpn : Ensure ansible_facts used by role ------- 2.64s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 fedora.linux_system_roles.vpn : Ensure ansible_facts used by role ------- 2.59s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- [DEPRECATION WARNING]: [defaults]callback_whitelist option, normalizing names to new standard, use callbacks_enabled instead. This feature will be removed from ansible-core in version 2.15. Deprecation warnings can be disabled by setting deprecation_warnings=False in ansible.cfg. ---^---^---^---^---^---