# STDOUT: ---v---v---v---v---v--- ansible-playbook 2.9.27 config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.9/lib/python3.6/site-packages/ansible executable location = /opt/ansible-2.9/bin/ansible-playbook python version = 3.6.8 (default, Jan 25 2023, 15:03:30) [GCC 8.5.0 20210514 (Red Hat 8.5.0-18)] Using /etc/ansible/ansible.cfg as config file Skipping callback 'actionable', as we already have a stdout callback. Skipping callback 'counter_enabled', as we already have a stdout callback. Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'full_skip', as we already have a stdout callback. Skipping callback 'json', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'null', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. Skipping callback 'selective', as we already have a stdout callback. Skipping callback 'skippy', as we already have a stdout callback. Skipping callback 'stderr', as we already have a stdout callback. Skipping callback 'unixy', as we already have a stdout callback. Skipping callback 'yaml', as we already have a stdout callback. PLAYBOOK: tests_host_to_host_cert.yml ****************************************** 1 plays in /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml PLAY [Test host to host tunnel with certificate] ******************************* TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:3 Monday 28 August 2023 01:29:26 +0000 (0:00:00.023) 0:00:00.023 ********* ok: [sut] META: ran handlers TASK [Set up test environment] ************************************************* task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:10 Monday 28 August 2023 01:29:27 +0000 (0:00:00.770) 0:00:00.794 ********* included: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/setup_test.yml for sut TASK [Set platform/version specific variables] ********************************* task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/setup_test.yml:2 Monday 28 August 2023 01:29:27 +0000 (0:00:00.029) 0:00:00.824 ********* TASK [linux-system-roles.vpn : Ensure ansible_facts used by role] ************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:2 Monday 28 August 2023 01:29:27 +0000 (0:00:00.048) 0:00:00.873 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:8 Monday 28 August 2023 01:29:27 +0000 (0:00:00.042) 0:00:00.915 ********* skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat_9.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_9.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat_9.3.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_9.3.yml", "skip_reason": "Conditional result was False" } TASK [Change inventory_hostname] *********************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/setup_test.yml:11 Monday 28 August 2023 01:29:27 +0000 (0:00:00.057) 0:00:00.973 ********* ok: [sut] => { "ansible_facts": { "inventory_hostname": "mainhost.local" }, "changed": false } TASK [Add sample main host] **************************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/setup_test.yml:18 Monday 28 August 2023 01:29:27 +0000 (0:00:00.033) 0:00:01.006 ********* creating host via 'add_host': hostname=mainhost.local changed: [sut] => { "add_host": { "groups": [], "host_name": "mainhost.local", "host_vars": {} }, "changed": true } TASK [Create nss directory for testing] **************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/setup_test.yml:22 Monday 28 August 2023 01:29:27 +0000 (0:00:00.033) 0:00:01.039 ********* changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/var/lib/ipsec/nss", "secontext": "unconfined_u:object_r:var_lib_t:s0", "size": 6, "state": "directory", "uid": 0 } TASK [Create /etc/ipsec.d directory for testing] ******************************* task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/setup_test.yml:28 Monday 28 August 2023 01:29:27 +0000 (0:00:00.306) 0:00:01.345 ********* changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0 } TASK [Dynamically add more hosts] ********************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/setup_test.yml:34 Monday 28 August 2023 01:29:27 +0000 (0:00:00.219) 0:00:01.565 ********* included: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/add_hosts.yml for sut TASK [Dynamically add multiple hosts for testing] ****************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/add_hosts.yml:2 Monday 28 August 2023 01:29:28 +0000 (0:00:00.021) 0:00:01.587 ********* creating host via 'add_host': hostname=host01.local changed: [sut] => (item=1) => { "add_host": { "groups": [ "testing" ], "host_name": "host01.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 1 } creating host via 'add_host': hostname=host02.local changed: [sut] => (item=2) => { "add_host": { "groups": [ "testing" ], "host_name": "host02.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 2 } TASK [Create mock vpn_connections] ********************************************* task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/add_hosts.yml:11 Monday 28 August 2023 01:29:28 +0000 (0:00:00.044) 0:00:01.631 ********* ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "hosts": { "host01.local": "", "host02.local": "", "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [Create sample policies directory for testing] **************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/setup_test.yml:40 Monday 28 August 2023 01:29:28 +0000 (0:00:00.038) 0:00:01.669 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/setup_test.yml:46 Monday 28 August 2023 01:29:28 +0000 (0:00:00.032) 0:00:01.702 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/setup_test.yml:52 Monday 28 August 2023 01:29:28 +0000 (0:00:00.032) 0:00:01.734 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/setup_test.yml:58 Monday 28 August 2023 01:29:28 +0000 (0:00:00.031) 0:00:01.765 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Add cert options to check] *********************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:13 Monday 28 August 2023 01:29:28 +0000 (0:00:00.030) 0:00:01.795 ********* ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "cert", "auto": "start", "hosts": { "host01.local": { "cert_name": "cert2" }, "host02.local": { "cert_name": "cert3" }, "mainhost.local": { "cert_name": "cert1" }, "sut": { "cert_name": "cert4" } }, "name": "tunnel1" } ] }, "changed": false } TASK [Save certname for main host] ********************************************* task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:27 Monday 28 August 2023 01:29:28 +0000 (0:00:00.035) 0:00:01.831 ********* ok: [sut] => { "ansible_facts": { "__vpn_main_certname": "cert1" }, "changed": false } TASK [Use vpn role] ************************************************************ task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:31 Monday 28 August 2023 01:29:28 +0000 (0:00:00.033) 0:00:01.865 ********* TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:3 Monday 28 August 2023 01:29:28 +0000 (0:00:00.052) 0:00:01.917 ********* included: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml for sut TASK [linux-system-roles.vpn : Ensure ansible_facts used by role] ************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:2 Monday 28 August 2023 01:29:28 +0000 (0:00:00.023) 0:00:01.941 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:8 Monday 28 August 2023 01:29:28 +0000 (0:00:00.032) 0:00:01.974 ********* skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat_9.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_9.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat_9.3.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_9.3.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Ensure required packages are installed] ********* task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:6 Monday 28 August 2023 01:29:28 +0000 (0:00:00.059) 0:00:02.033 ********* changed: [sut] => { "changed": true, "rc": 0, "results": [ "Installed: ldns-1.7.1-11.el9.x86_64", "Installed: unbound-libs-1.16.2-3.el9.x86_64", "Installed: libreswan-4.12-1.el9.x86_64", "Installed: nspr-4.35.0-3.el9_2.x86_64", "Installed: protobuf-c-1.3.3-13.el9.x86_64", "Installed: nss-3.90.0-3.el9_2.x86_64", "Installed: nss-softokn-3.90.0-3.el9_2.x86_64", "Installed: nss-softokn-freebl-3.90.0-3.el9_2.x86_64", "Installed: nss-sysinit-3.90.0-3.el9_2.x86_64", "Installed: nss-tools-3.90.0-3.el9_2.x86_64", "Installed: nss-util-3.90.0-3.el9_2.x86_64" ] } TASK [linux-system-roles.vpn : Configure firewall] ***************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:12 Monday 28 August 2023 01:29:34 +0000 (0:00:05.836) 0:00:07.870 ********* included: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/firewall.yml for sut TASK [Ensure the vpn ports status with the firewall role] ********************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/firewall.yml:3 Monday 28 August 2023 01:29:34 +0000 (0:00:00.024) 0:00:07.894 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Configure selinux] ****************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:15 Monday 28 August 2023 01:29:34 +0000 (0:00:00.033) 0:00:07.928 ********* included: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/selinux.yml for sut TASK [linux-system-roles.vpn : Populate service facts] ************************* task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:3 Monday 28 August 2023 01:29:34 +0000 (0:00:00.028) 0:00:07.956 ********* ok: [sut] => { "ansible_facts": { "services": { "NetworkManager-dispatcher.service": { "name": "NetworkManager-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "NetworkManager-wait-online.service": { "name": "NetworkManager-wait-online.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "NetworkManager.service": { "name": "NetworkManager.service", "source": "systemd", "state": "running", "status": "enabled" }, "auditd.service": { "name": "auditd.service", "source": "systemd", "state": "running", "status": "enabled" }, "auth-rpcgss-module.service": { "name": "auth-rpcgss-module.service", "source": "systemd", "state": "stopped", "status": "static" }, "autovt@.service": { "name": "autovt@.service", "source": "systemd", "state": "unknown", "status": "alias" }, "chrony-wait.service": { "name": "chrony-wait.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "chronyd.service": { "name": "chronyd.service", "source": "systemd", "state": "running", "status": "enabled" }, "cloud-config.service": { "name": "cloud-config.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-final.service": { "name": "cloud-final.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init-hotplugd.service": { "name": "cloud-init-hotplugd.service", "source": "systemd", "state": "inactive", "status": "static" }, "cloud-init-local.service": { "name": "cloud-init-local.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init.service": { "name": "cloud-init.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "console-getty.service": { "name": "console-getty.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "container-getty@.service": { "name": "container-getty@.service", "source": "systemd", "state": "unknown", "status": "static" }, "cpupower.service": { "name": "cpupower.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "crond.service": { "name": "crond.service", "source": "systemd", "state": "running", "status": "enabled" }, "dbus-broker.service": { "name": "dbus-broker.service", "source": "systemd", "state": "running", "status": "enabled" }, "dbus-org.freedesktop.hostname1.service": { "name": "dbus-org.freedesktop.hostname1.service", "source": "systemd", "state": "inactive", "status": "alias" }, "dbus-org.freedesktop.locale1.service": { "name": "dbus-org.freedesktop.locale1.service", "source": "systemd", "state": "inactive", "status": "alias" }, "dbus-org.freedesktop.login1.service": { "name": "dbus-org.freedesktop.login1.service", "source": "systemd", "state": "active", "status": "alias" }, "dbus-org.freedesktop.nm-dispatcher.service": { "name": "dbus-org.freedesktop.nm-dispatcher.service", "source": "systemd", "state": "inactive", "status": "alias" }, "dbus-org.freedesktop.timedate1.service": { "name": "dbus-org.freedesktop.timedate1.service", "source": "systemd", "state": "inactive", "status": "alias" }, "dbus.service": { "name": "dbus.service", "source": "systemd", "state": "active", "status": "alias" }, "debug-shell.service": { "name": "debug-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "dnf-makecache.service": { "name": "dnf-makecache.service", "source": "systemd", "state": "stopped", "status": "static" }, "dnf-system-upgrade-cleanup.service": { "name": "dnf-system-upgrade-cleanup.service", "source": "systemd", "state": "inactive", "status": "static" }, "dnf-system-upgrade.service": { "name": "dnf-system-upgrade.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "dracut-cmdline.service": { "name": "dracut-cmdline.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-initqueue.service": { "name": "dracut-initqueue.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-mount.service": { "name": "dracut-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-mount.service": { "name": "dracut-pre-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-pivot.service": { "name": "dracut-pre-pivot.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-trigger.service": { "name": "dracut-pre-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-udev.service": { "name": "dracut-pre-udev.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown-onfailure.service": { "name": "dracut-shutdown-onfailure.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown.service": { "name": "dracut-shutdown.service", "source": "systemd", "state": "stopped", "status": "static" }, "emergency.service": { "name": "emergency.service", "source": "systemd", "state": "stopped", "status": "static" }, "firewalld.service": { "name": "firewalld.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "fstrim.service": { "name": "fstrim.service", "source": "systemd", "state": "inactive", "status": "static" }, "getty@.service": { "name": "getty@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "getty@tty1.service": { "name": "getty@tty1.service", "source": "systemd", "state": "running", "status": "unknown" }, "grub-boot-indeterminate.service": { "name": "grub-boot-indeterminate.service", "source": "systemd", "state": "inactive", "status": "static" }, "grub2-systemd-integration.service": { "name": "grub2-systemd-integration.service", "source": "systemd", "state": "inactive", "status": "static" }, "gssproxy.service": { "name": "gssproxy.service", "source": "systemd", "state": "running", "status": "disabled" }, "import-state.service": { "name": "import-state.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "initrd-cleanup.service": { "name": "initrd-cleanup.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-parse-etc.service": { "name": "initrd-parse-etc.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-switch-root.service": { "name": "initrd-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-udevadm-cleanup-db.service": { "name": "initrd-udevadm-cleanup-db.service", "source": "systemd", "state": "stopped", "status": "static" }, "ipsec.service": { "name": "ipsec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "irqbalance.service": { "name": "irqbalance.service", "source": "systemd", "state": "running", "status": "enabled" }, "kdump.service": { "name": "kdump.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "kmod-static-nodes.service": { "name": "kmod-static-nodes.service", "source": "systemd", "state": "stopped", "status": "static" }, "kvm_stat.service": { "name": "kvm_stat.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ldconfig.service": { "name": "ldconfig.service", "source": "systemd", "state": "stopped", "status": "static" }, "loadmodules.service": { "name": "loadmodules.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "logrotate.service": { "name": "logrotate.service", "source": "systemd", "state": "stopped", "status": "static" }, "man-db-cache-update.service": { "name": "man-db-cache-update.service", "source": "systemd", "state": "inactive", "status": "static" }, "man-db-restart-cache-update.service": { "name": "man-db-restart-cache-update.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "microcode.service": { "name": "microcode.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "modprobe@.service": { "name": "modprobe@.service", "source": "systemd", "state": "unknown", "status": "static" }, "modprobe@configfs.service": { "name": "modprobe@configfs.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "modprobe@drm.service": { "name": "modprobe@drm.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "modprobe@fuse.service": { "name": "modprobe@fuse.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "nfs-blkmap.service": { "name": "nfs-blkmap.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-idmapd.service": { "name": "nfs-idmapd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-mountd.service": { "name": "nfs-mountd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-server.service": { "name": "nfs-server.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nfs-utils.service": { "name": "nfs-utils.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfsdcld.service": { "name": "nfsdcld.service", "source": "systemd", "state": "stopped", "status": "static" }, "nftables.service": { "name": "nftables.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nis-domainname.service": { "name": "nis-domainname.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "nm-priv-helper.service": { "name": "nm-priv-helper.service", "source": "systemd", "state": "inactive", "status": "static" }, "oddjobd.service": { "name": "oddjobd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "pam_namespace.service": { "name": "pam_namespace.service", "source": "systemd", "state": "inactive", "status": "static" }, "qemu-guest-agent.service": { "name": "qemu-guest-agent.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "quotaon.service": { "name": "quotaon.service", "source": "systemd", "state": "inactive", "status": "static" }, "rc-local.service": { "name": "rc-local.service", "source": "systemd", "state": "stopped", "status": "static" }, "rdisc.service": { "name": "rdisc.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rescue.service": { "name": "rescue.service", "source": "systemd", "state": "stopped", "status": "static" }, "restraintd.service": { "name": "restraintd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rhsm-facts.service": { "name": "rhsm-facts.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rhsm.service": { "name": "rhsm.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rhsmcertd.service": { "name": "rhsmcertd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rngd.service": { "name": "rngd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpc-gssd.service": { "name": "rpc-gssd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd-notify.service": { "name": "rpc-statd-notify.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd.service": { "name": "rpc-statd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpcbind.service": { "name": "rpcbind.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpmdb-rebuild.service": { "name": "rpmdb-rebuild.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rsyslog.service": { "name": "rsyslog.service", "source": "systemd", "state": "running", "status": "enabled" }, "selinux-autorelabel-mark.service": { "name": "selinux-autorelabel-mark.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "selinux-autorelabel.service": { "name": "selinux-autorelabel.service", "source": "systemd", "state": "inactive", "status": "static" }, "selinux-check-proper-disable.service": { "name": "selinux-check-proper-disable.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "serial-getty@.service": { "name": "serial-getty@.service", "source": "systemd", "state": "unknown", "status": "indirect" }, "serial-getty@ttyS0.service": { "name": "serial-getty@ttyS0.service", "source": "systemd", "state": "running", "status": "unknown" }, "sshd-keygen@.service": { "name": "sshd-keygen@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "sshd-keygen@ecdsa.service": { "name": "sshd-keygen@ecdsa.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "sshd-keygen@ed25519.service": { "name": "sshd-keygen@ed25519.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "sshd-keygen@rsa.service": { "name": "sshd-keygen@rsa.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "sshd.service": { "name": "sshd.service", "source": "systemd", "state": "running", "status": "enabled" }, "sshd@.service": { "name": "sshd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "sssd-autofs.service": { "name": "sssd-autofs.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-kcm.service": { "name": "sssd-kcm.service", "source": "systemd", "state": "stopped", "status": "indirect" }, "sssd-nss.service": { "name": "sssd-nss.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-pac.service": { "name": "sssd-pac.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-pam.service": { "name": "sssd-pam.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-ssh.service": { "name": "sssd-ssh.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-sudo.service": { "name": "sssd-sudo.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd.service": { "name": "sssd.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "system-update-cleanup.service": { "name": "system-update-cleanup.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-ask-password-console.service": { "name": "systemd-ask-password-console.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-wall.service": { "name": "systemd-ask-password-wall.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-backlight@.service": { "name": "systemd-backlight@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-binfmt.service": { "name": "systemd-binfmt.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-bless-boot.service": { "name": "systemd-bless-boot.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-boot-check-no-failures.service": { "name": "systemd-boot-check-no-failures.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-boot-system-token.service": { "name": "systemd-boot-system-token.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-boot-update.service": { "name": "systemd-boot-update.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-coredump@.service": { "name": "systemd-coredump@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-exit.service": { "name": "systemd-exit.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-firstboot.service": { "name": "systemd-firstboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck-root.service": { "name": "systemd-fsck-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck@.service": { "name": "systemd-fsck@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-growfs-root.service": { "name": "systemd-growfs-root.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-growfs@.service": { "name": "systemd-growfs@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-halt.service": { "name": "systemd-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hibernate-resume@.service": { "name": "systemd-hibernate-resume@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-hibernate.service": { "name": "systemd-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hostnamed.service": { "name": "systemd-hostnamed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hwdb-update.service": { "name": "systemd-hwdb-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-hybrid-sleep.service": { "name": "systemd-hybrid-sleep.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-initctl.service": { "name": "systemd-initctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-catalog-update.service": { "name": "systemd-journal-catalog-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-flush.service": { "name": "systemd-journal-flush.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journald.service": { "name": "systemd-journald.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-journald@.service": { "name": "systemd-journald@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-kexec.service": { "name": "systemd-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-localed.service": { "name": "systemd-localed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-logind.service": { "name": "systemd-logind.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-machine-id-commit.service": { "name": "systemd-machine-id-commit.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-modules-load.service": { "name": "systemd-modules-load.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-network-generator.service": { "name": "systemd-network-generator.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-pcrphase-initrd.service": { "name": "systemd-pcrphase-initrd.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-pcrphase-sysinit.service": { "name": "systemd-pcrphase-sysinit.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-pcrphase.service": { "name": "systemd-pcrphase.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-poweroff.service": { "name": "systemd-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-pstore.service": { "name": "systemd-pstore.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-quotacheck.service": { "name": "systemd-quotacheck.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-random-seed.service": { "name": "systemd-random-seed.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-reboot.service": { "name": "systemd-reboot.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-remount-fs.service": { "name": "systemd-remount-fs.service", "source": "systemd", "state": "stopped", "status": "enabled-runtime" }, "systemd-repart.service": { "name": "systemd-repart.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-rfkill.service": { "name": "systemd-rfkill.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-suspend-then-hibernate.service": { "name": "systemd-suspend-then-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-suspend.service": { "name": "systemd-suspend.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-sysctl.service": { "name": "systemd-sysctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-sysext.service": { "name": "systemd-sysext.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "systemd-sysupdate-reboot.service": { "name": "systemd-sysupdate-reboot.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "systemd-sysupdate.service": { "name": "systemd-sysupdate.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "systemd-sysusers.service": { "name": "systemd-sysusers.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-timedated.service": { "name": "systemd-timedated.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-tmpfiles-clean.service": { "name": "systemd-tmpfiles-clean.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup-dev.service": { "name": "systemd-tmpfiles-setup-dev.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup.service": { "name": "systemd-tmpfiles-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-settle.service": { "name": "systemd-udev-settle.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-trigger.service": { "name": "systemd-udev-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udevd.service": { "name": "systemd-udevd.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-update-done.service": { "name": "systemd-update-done.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp-runlevel.service": { "name": "systemd-update-utmp-runlevel.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp.service": { "name": "systemd-update-utmp.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-user-sessions.service": { "name": "systemd-user-sessions.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-vconsole-setup.service": { "name": "systemd-vconsole-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-volatile-root.service": { "name": "systemd-volatile-root.service", "source": "systemd", "state": "inactive", "status": "static" }, "teamd@.service": { "name": "teamd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "unbound-anchor.service": { "name": "unbound-anchor.service", "source": "systemd", "state": "stopped", "status": "static" }, "user-runtime-dir@.service": { "name": "user-runtime-dir@.service", "source": "systemd", "state": "unknown", "status": "static" }, "user-runtime-dir@0.service": { "name": "user-runtime-dir@0.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "user@.service": { "name": "user@.service", "source": "systemd", "state": "unknown", "status": "static" }, "user@0.service": { "name": "user@0.service", "source": "systemd", "state": "running", "status": "unknown" } } }, "changed": false } TASK [linux-system-roles.vpn : Get the ipsec tcp service ports] **************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:12 Monday 28 August 2023 01:29:36 +0000 (0:00:01.751) 0:00:09.708 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Initialize _vpn_selinux] ************************ task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:20 Monday 28 August 2023 01:29:36 +0000 (0:00:00.053) 0:00:09.762 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Add the ipsec service ports to _vpn_selinux] **** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:24 Monday 28 August 2023 01:29:36 +0000 (0:00:00.057) 0:00:09.819 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Ensure the service and the ports status with the selinux role] *********** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:33 Monday 28 August 2023 01:29:36 +0000 (0:00:00.051) 0:00:09.871 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Ensure OpenSSL is installed on the controller] *** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:25 Monday 28 August 2023 01:29:36 +0000 (0:00:00.051) 0:00:09.923 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Enforce default auth method as needed] ********** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:33 Monday 28 August 2023 01:29:36 +0000 (0:00:00.042) 0:00:09.965 ********* ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "cert", "auto": "start", "hosts": { "host01.local": { "cert_name": "cert2" }, "host02.local": { "cert_name": "cert3" }, "mainhost.local": { "cert_name": "cert1" }, "sut": { "cert_name": "cert4" } }, "name": "tunnel1" } ] }, "changed": false } TASK [linux-system-roles.vpn : Make sure that the hosts list is not empty] ***** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:43 Monday 28 August 2023 01:29:36 +0000 (0:00:00.048) 0:00:10.014 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Make sure there is at least one pair of hosts in each connection] *** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:58 Monday 28 August 2023 01:29:36 +0000 (0:00:00.045) 0:00:10.060 ********* ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "cert", "auto": "start", "hosts": { "host01.local": { "cert_name": "cert2" }, "host02.local": { "cert_name": "cert3" }, "mainhost.local": { "cert_name": "cert1" }, "sut": { "cert_name": "cert4" } }, "name": "tunnel1" } ] }, "changed": false } TASK [linux-system-roles.vpn : Ensure cert_names are populated when auth_method is cert] *** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:72 Monday 28 August 2023 01:29:36 +0000 (0:00:00.044) 0:00:10.105 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Generate PSKs or use provided shared_key_content] *** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:99 Monday 28 August 2023 01:29:36 +0000 (0:00:00.049) 0:00:10.155 ********* ok: [sut -> localhost] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [linux-system-roles.vpn : Set psks for hosts] ***************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:136 Monday 28 August 2023 01:29:36 +0000 (0:00:00.045) 0:00:10.200 ********* ok: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [linux-system-roles.vpn : Create ipsec.conf files] ************************ task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:160 Monday 28 August 2023 01:29:36 +0000 (0:00:00.115) 0:00:10.316 ********* changed: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": true, "checksum": "9f319a1d5de38c31ba225e477a5c0a475aa29762", "dest": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "gid": 0, "group": "root", "item": "host01.local", "md5sum": "5d7c86c67711475f8a65a91054d8d074", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 263, "src": "/root/.ansible/tmp/ansible-tmp-1693186176.807913-1703-47143053138464/source", "state": "file", "uid": 0 } changed: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": true, "checksum": "8d06b6ec170618d4aee6c1b6466b7c9158b1f313", "dest": "/etc/ipsec.d/mainhost.local-to-host02.local.conf", "gid": 0, "group": "root", "item": "host02.local", "md5sum": "6f0f3818ca1d8c9da6abc281bbb0dc79", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 263, "src": "/root/.ansible/tmp/ansible-tmp-1693186177.620746-1703-143576230568472/source", "state": "file", "uid": 0 } changed: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": true, "checksum": "0e421514fa36bdf7cd0ab629fba83778ce2f88a1", "dest": "/etc/ipsec.d/mainhost.local-to-sut.conf", "gid": 0, "group": "root", "item": "sut", "md5sum": "cd574e3086acd9a041e34976d5a78d8f", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 259, "src": "/root/.ansible/tmp/ansible-tmp-1693186178.2120535-1703-264301540970804/source", "state": "file", "uid": 0 } NOTIFIED HANDLER linux-system-roles.vpn : Restart vpn service and wait for ssh conn to return for sut NOTIFIED HANDLER linux-system-roles.vpn : Restart vpn service and wait for ssh conn to return for sut TASK [linux-system-roles.vpn : Check if secrets file already exists] *********** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:168 Monday 28 August 2023 01:29:38 +0000 (0:00:02.040) 0:00:12.356 ********* ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "exists": false } } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "item": "host02.local", "stat": { "exists": false } } ok: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": false, "item": "sut", "stat": { "exists": false } } TASK [linux-system-roles.vpn : Create ipsec.secrets files] ********************* task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:174 Monday 28 August 2023 01:29:39 +0000 (0:00:00.608) 0:00:12.965 ********* changed: [sut] => (item={'changed': False, 'stat': {'exists': False}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "264554cde7efa990062f102d6a356cc2d05e70df", "dest": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "stat": { "exists": false } }, "md5sum": "d99a491f546e577ea94e604ca045002b", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 85, "src": "/root/.ansible/tmp/ansible-tmp-1693186179.457345-1734-188567714132222/source", "state": "file", "uid": 0 } changed: [sut] => (item={'changed': False, 'stat': {'exists': False}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "8b8d56b0a0466ef9d976040be2e14351c4ef0fc8", "dest": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" } }, "item": "host02.local", "stat": { "exists": false } }, "md5sum": "32665f24e233f0a9a9f8c77fe2725c9d", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 85, "src": "/root/.ansible/tmp/ansible-tmp-1693186180.058732-1734-61657659429684/source", "state": "file", "uid": 0 } changed: [sut] => (item={'changed': False, 'stat': {'exists': False}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-sut.secrets', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'sut', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "8e27c14d3ee07043555b107fa56821402b48391e", "dest": "/etc/ipsec.d/mainhost.local-to-sut.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-sut.secrets" } }, "item": "sut", "stat": { "exists": false } }, "md5sum": "c4f0e9bd4ae597a6825b16a595ade479", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 82, "src": "/root/.ansible/tmp/ansible-tmp-1693186180.6623447-1734-218562100809301/source", "state": "file", "uid": 0 } TASK [linux-system-roles.vpn : Build opportunistic configuration] ************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:184 Monday 28 August 2023 01:29:41 +0000 (0:00:01.868) 0:00:14.834 ********* skipping: [sut] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } skipping: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [Assert file existence] *************************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:36 Monday 28 August 2023 01:29:41 +0000 (0:00:00.044) 0:00:14.878 ********* included: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/assert_conf_secrets_files_exist.yml for sut TASK [Stat conf files paths] *************************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/assert_conf_secrets_files_exist.yml:2 Monday 28 August 2023 01:29:41 +0000 (0:00:00.042) 0:00:14.921 ********* ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "atime": 1693186177.5275397, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "9f319a1d5de38c31ba225e477a5c0a475aa29762", "ctime": 1693186177.5315397, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 704643521, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1693186177.1955416, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 263, "uid": 0, "version": "1991747376", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "item": "host02.local", "stat": { "atime": 1693186178.1215367, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "8d06b6ec170618d4aee6c1b6466b7c9158b1f313", "ctime": 1693186178.1255367, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 729809409, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1693186177.9075377, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 263, "uid": 0, "version": "756358192", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Stat secrets files paths] ************************************************ task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/assert_conf_secrets_files_exist.yml:8 Monday 28 August 2023 01:29:41 +0000 (0:00:00.453) 0:00:15.375 ********* ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "atime": 1693186179.9635267, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "264554cde7efa990062f102d6a356cc2d05e70df", "ctime": 1693186179.9685268, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 805306881, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1693186179.749528, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 85, "uid": 0, "version": "4264869191", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "item": "host02.local", "stat": { "atime": 1693186180.5685236, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "8b8d56b0a0466ef9d976040be2e14351c4ef0fc8", "ctime": 1693186180.5735235, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 830472705, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1693186180.3485248, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 85, "uid": 0, "version": "3460598880", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Assert that ipsec.conf and secrets files exist] ************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/assert_conf_secrets_files_exist.yml:14 Monday 28 August 2023 01:29:42 +0000 (0:00:00.476) 0:00:15.851 ********* ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'mode': '0644', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 263, 'inode': 704643521, 'dev': 51716, 'nlink': 1, 'atime': 1693186177.5275397, 'mtime': 1693186177.1955416, 'ctime': 1693186177.5315397, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': True, 'xgrp': False, 'woth': False, 'roth': True, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': '9f319a1d5de38c31ba225e477a5c0a475aa29762', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '1991747376', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } }, "item": "host01.local", "stat": { "atime": 1693186177.5275397, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "9f319a1d5de38c31ba225e477a5c0a475aa29762", "ctime": 1693186177.5315397, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 704643521, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1693186177.1955416, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 263, "uid": 0, "version": "1991747376", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host02.local.conf', 'mode': '0644', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 263, 'inode': 729809409, 'dev': 51716, 'nlink': 1, 'atime': 1693186178.1215367, 'mtime': 1693186177.9075377, 'ctime': 1693186178.1255367, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': True, 'xgrp': False, 'woth': False, 'roth': True, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': '8d06b6ec170618d4aee6c1b6466b7c9158b1f313', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '756358192', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host02.local.conf', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.conf" } }, "item": "host02.local", "stat": { "atime": 1693186178.1215367, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "8d06b6ec170618d4aee6c1b6466b7c9158b1f313", "ctime": 1693186178.1255367, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 729809409, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1693186177.9075377, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 263, "uid": 0, "version": "756358192", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed TASK [Assert that ipsec.conf and secrets files exist] ************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/assert_conf_secrets_files_exist.yml:20 Monday 28 August 2023 01:29:42 +0000 (0:00:00.050) 0:00:15.902 ********* ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'mode': '0600', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 85, 'inode': 805306881, 'dev': 51716, 'nlink': 1, 'atime': 1693186179.9635267, 'mtime': 1693186179.749528, 'ctime': 1693186179.9685268, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': False, 'xgrp': False, 'woth': False, 'roth': False, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': '264554cde7efa990062f102d6a356cc2d05e70df', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '4264869191', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "stat": { "atime": 1693186179.9635267, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "264554cde7efa990062f102d6a356cc2d05e70df", "ctime": 1693186179.9685268, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 805306881, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1693186179.749528, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 85, "uid": 0, "version": "4264869191", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets', 'mode': '0600', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 85, 'inode': 830472705, 'dev': 51716, 'nlink': 1, 'atime': 1693186180.5685236, 'mtime': 1693186180.3485248, 'ctime': 1693186180.5735235, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': False, 'xgrp': False, 'woth': False, 'roth': False, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': '8b8d56b0a0466ef9d976040be2e14351c4ef0fc8', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '3460598880', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" } }, "item": "host02.local", "stat": { "atime": 1693186180.5685236, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "8b8d56b0a0466ef9d976040be2e14351c4ef0fc8", "ctime": 1693186180.5735235, "dev": 51716, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 830472705, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1693186180.3485248, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 85, "uid": 0, "version": "3460598880", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed TASK [Reset success flag] ****************************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:39 Monday 28 August 2023 01:29:42 +0000 (0:00:00.053) 0:00:15.955 ********* ok: [sut] => { "ansible_facts": { "__vpn_success": true }, "changed": false } TASK [Get and store conf files] ************************************************ task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:43 Monday 28 August 2023 01:29:42 +0000 (0:00:00.019) 0:00:15.975 ********* ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpjb25uIHR1bm5lbDEtbWFpbmhvc3QubG9jYWwtdG8taG9zdDAxLmxvY2FsCiAgbGVmdD1tYWluaG9zdC5sb2NhbAogIGxlZnRpZD1AbWFpbmhvc3QubG9jYWwKICByaWdodD1ob3N0MDEubG9jYWwKICBpa2V2Mj1pbnNpc3QKICBhdXRvPXN0YXJ0CiAgcmlnaHRpZD0lZnJvbWNlcnQKICBsZWZ0cnNhc2lna2V5PSVjZXJ0CiAgbGVmdGNlcnQ9Y2VydDEKICByaWdodHJzYXNpZ2tleT0lY2VydAo=", "encoding": "base64", "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpjb25uIHR1bm5lbDEtbWFpbmhvc3QubG9jYWwtdG8taG9zdDAyLmxvY2FsCiAgbGVmdD1tYWluaG9zdC5sb2NhbAogIGxlZnRpZD1AbWFpbmhvc3QubG9jYWwKICByaWdodD1ob3N0MDIubG9jYWwKICBpa2V2Mj1pbnNpc3QKICBhdXRvPXN0YXJ0CiAgcmlnaHRpZD0lZnJvbWNlcnQKICBsZWZ0cnNhc2lna2V5PSVjZXJ0CiAgbGVmdGNlcnQ9Y2VydDEKICByaWdodHJzYXNpZ2tleT0lY2VydAo=", "encoding": "base64", "item": "host02.local", "source": "/etc/ipsec.d/mainhost.local-to-host02.local.conf" } TASK [Check that conf file contains correct information] *********************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:49 Monday 28 August 2023 01:29:42 +0000 (0:00:00.480) 0:00:16.455 ********* skipping: [sut] => (item={'content': 'IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpjb25uIHR1bm5lbDEtbWFpbmhvc3QubG9jYWwtdG8taG9zdDAxLmxvY2FsCiAgbGVmdD1tYWluaG9zdC5sb2NhbAogIGxlZnRpZD1AbWFpbmhvc3QubG9jYWwKICByaWdodD1ob3N0MDEubG9jYWwKICBpa2V2Mj1pbnNpc3QKICBhdXRvPXN0YXJ0CiAgcmlnaHRpZD0lZnJvbWNlcnQKICBsZWZ0cnNhc2lna2V5PSVjZXJ0CiAgbGVmdGNlcnQ9Y2VydDEKICByaWdodHJzYXNpZ2tleT0lY2VydAo=', 'source': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host01.local.conf'}}, 'failed': False, 'changed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "idx": 0, "item": { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpjb25uIHR1bm5lbDEtbWFpbmhvc3QubG9jYWwtdG8taG9zdDAxLmxvY2FsCiAgbGVmdD1tYWluaG9zdC5sb2NhbAogIGxlZnRpZD1AbWFpbmhvc3QubG9jYWwKICByaWdodD1ob3N0MDEubG9jYWwKICBpa2V2Mj1pbnNpc3QKICBhdXRvPXN0YXJ0CiAgcmlnaHRpZD0lZnJvbWNlcnQKICBsZWZ0cnNhc2lna2V5PSVjZXJ0CiAgbGVmdGNlcnQ9Y2VydDEKICByaWdodHJzYXNpZ2tleT0lY2VydAo=", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } }, "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'content': 'IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpjb25uIHR1bm5lbDEtbWFpbmhvc3QubG9jYWwtdG8taG9zdDAyLmxvY2FsCiAgbGVmdD1tYWluaG9zdC5sb2NhbAogIGxlZnRpZD1AbWFpbmhvc3QubG9jYWwKICByaWdodD1ob3N0MDIubG9jYWwKICBpa2V2Mj1pbnNpc3QKICBhdXRvPXN0YXJ0CiAgcmlnaHRpZD0lZnJvbWNlcnQKICBsZWZ0cnNhc2lna2V5PSVjZXJ0CiAgbGVmdGNlcnQ9Y2VydDEKICByaWdodHJzYXNpZ2tleT0lY2VydAo=', 'source': '/etc/ipsec.d/mainhost.local-to-host02.local.conf', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host02.local.conf'}}, 'failed': False, 'changed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "idx": 1, "item": { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpjb25uIHR1bm5lbDEtbWFpbmhvc3QubG9jYWwtdG8taG9zdDAyLmxvY2FsCiAgbGVmdD1tYWluaG9zdC5sb2NhbAogIGxlZnRpZD1AbWFpbmhvc3QubG9jYWwKICByaWdodD1ob3N0MDIubG9jYWwKICBpa2V2Mj1pbnNpc3QKICBhdXRvPXN0YXJ0CiAgcmlnaHRpZD0lZnJvbWNlcnQKICBsZWZ0cnNhc2lna2V5PSVjZXJ0CiAgbGVmdGNlcnQ9Y2VydDEKICByaWdodHJzYXNpZ2tleT0lY2VydAo=", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host02.local.conf" } }, "item": "host02.local", "source": "/etc/ipsec.d/mainhost.local-to-host02.local.conf" }, "skip_reason": "Conditional result was False" } TASK [Assert success for conf files] ******************************************* task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:75 Monday 28 August 2023 01:29:42 +0000 (0:00:00.076) 0:00:16.532 ********* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get and store secrets files] ********************************************* task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:80 Monday 28 August 2023 01:29:43 +0000 (0:00:00.044) 0:00:16.576 ********* ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpAbWFpbmhvc3QubG9jYWwgQGhvc3QwMS5sb2NhbCA6IFJTQSAiY2VydDEiCg==", "encoding": "base64", "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } ok: [sut] => (item=host02.local) => { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpAbWFpbmhvc3QubG9jYWwgQGhvc3QwMi5sb2NhbCA6IFJTQSAiY2VydDEiCg==", "encoding": "base64", "item": "host02.local", "source": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" } TASK [Check that secrets file contains correct information] ******************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:86 Monday 28 August 2023 01:29:43 +0000 (0:00:00.425) 0:00:17.002 ********* skipping: [sut] => (item={'content': 'IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpAbWFpbmhvc3QubG9jYWwgQGhvc3QwMS5sb2NhbCA6IFJTQSAiY2VydDEiCg==', 'source': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets'}}, 'failed': False, 'changed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "idx": 0, "item": { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpAbWFpbmhvc3QubG9jYWwgQGhvc3QwMS5sb2NhbCA6IFJTQSAiY2VydDEiCg==", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'content': 'IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpAbWFpbmhvc3QubG9jYWwgQGhvc3QwMi5sb2NhbCA6IFJTQSAiY2VydDEiCg==', 'source': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host02.local.secrets'}}, 'failed': False, 'changed': False, 'item': 'host02.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "idx": 1, "item": { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpAbWFpbmhvc3QubG9jYWwgQGhvc3QwMi5sb2NhbCA6IFJTQSAiY2VydDEiCg==", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" } }, "item": "host02.local", "source": "/etc/ipsec.d/mainhost.local-to-host02.local.secrets" }, "skip_reason": "Conditional result was False" } TASK [Assert success for secrets files] **************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:98 Monday 28 August 2023 01:29:43 +0000 (0:00:00.050) 0:00:17.052 ********* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Check the firewall and the selinux port status] ************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:103 Monday 28 August 2023 01:29:43 +0000 (0:00:00.038) 0:00:17.091 ********* included: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_firewall_selinux.yml for sut TASK [Get firewall service] **************************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_firewall_selinux.yml:9 Monday 28 August 2023 01:29:43 +0000 (0:00:00.041) 0:00:17.133 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Ensure 'ipsec' is in the firewalld service list] ************************* task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_firewall_selinux.yml:14 Monday 28 August 2023 01:29:43 +0000 (0:00:00.034) 0:00:17.167 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Get associated selinux ports] ******************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_firewall_selinux.yml:19 Monday 28 August 2023 01:29:43 +0000 (0:00:00.037) 0:00:17.205 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Check associated selinux ports when vpn_manage_selinux is true] ********** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_firewall_selinux.yml:27 Monday 28 August 2023 01:29:43 +0000 (0:00:00.033) 0:00:17.238 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Check for ansible_managed, fingerprint in generated files] *************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:106 Monday 28 August 2023 01:29:43 +0000 (0:00:00.036) 0:00:17.274 ********* included: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_header.yml for sut included: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_header.yml for sut included: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_header.yml for sut included: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_header.yml for sut TASK [Get file] **************************************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_header.yml:3 Monday 28 August 2023 01:29:43 +0000 (0:00:00.079) 0:00:17.354 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Check for presence of ansible managed header, fingerprint] *************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_header.yml:9 Monday 28 August 2023 01:29:43 +0000 (0:00:00.046) 0:00:17.401 ********* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get file] **************************************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_header.yml:3 Monday 28 August 2023 01:29:43 +0000 (0:00:00.068) 0:00:17.470 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Check for presence of ansible managed header, fingerprint] *************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_header.yml:9 Monday 28 August 2023 01:29:43 +0000 (0:00:00.037) 0:00:17.508 ********* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get file] **************************************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_header.yml:3 Monday 28 August 2023 01:29:44 +0000 (0:00:00.069) 0:00:17.577 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Check for presence of ansible managed header, fingerprint] *************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_header.yml:9 Monday 28 August 2023 01:29:44 +0000 (0:00:00.035) 0:00:17.612 ********* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get file] **************************************************************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_header.yml:3 Monday 28 August 2023 01:29:44 +0000 (0:00:00.067) 0:00:17.679 ********* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Check for presence of ansible managed header, fingerprint] *************** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_header.yml:9 Monday 28 August 2023 01:29:44 +0000 (0:00:00.042) 0:00:17.722 ********* ok: [sut] => { "changed": false } MSG: All assertions passed RUNNING HANDLER [linux-system-roles.vpn : Restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/handlers/main.yml:2 Monday 28 August 2023 01:29:44 +0000 (0:00:00.075) 0:00:17.797 ********* included: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [linux-system-roles.vpn : Enable and restart vpn services] ***** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:2 Monday 28 August 2023 01:29:44 +0000 (0:00:00.042) 0:00:17.839 ********* changed: [sut] => (item=ipsec) => { "ansible_job_id": "129250461025.7535", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/129250461025.7535", "started": 1 } RUNNING HANDLER [linux-system-roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:11 Monday 28 August 2023 01:29:45 +0000 (0:00:00.878) 0:00:18.718 ********* ok: [sut] => { "changed": false, "elapsed": 3 } RUNNING HANDLER [linux-system-roles.vpn : Restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/handlers/main.yml:2 Monday 28 August 2023 01:29:48 +0000 (0:00:03.626) 0:00:22.345 ********* included: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [linux-system-roles.vpn : Enable and restart vpn services] ***** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:2 Monday 28 August 2023 01:29:48 +0000 (0:00:00.028) 0:00:22.373 ********* changed: [sut] => (item=ipsec) => { "ansible_job_id": "149568317621.7971", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/149568317621.7971", "started": 1 } RUNNING HANDLER [linux-system-roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:11 Monday 28 August 2023 01:29:49 +0000 (0:00:00.560) 0:00:22.934 ********* ok: [sut] => { "changed": false, "elapsed": 3 } META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* sut : ok=48 changed=9 unreachable=0 failed=0 skipped=27 rescued=0 ignored=0 Monday 28 August 2023 01:29:52 +0000 (0:00:03.594) 0:00:26.528 ********* =============================================================================== linux-system-roles.vpn : Ensure required packages are installed --------- 5.84s /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:6 linux-system-roles.vpn : Wait for ssh connection to return -------------- 3.63s /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:11 linux-system-roles.vpn : Wait for ssh connection to return -------------- 3.59s /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:11 linux-system-roles.vpn : Create ipsec.conf files ------------------------ 2.04s /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:160 linux-system-roles.vpn : Create ipsec.secrets files --------------------- 1.87s /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:174 linux-system-roles.vpn : Populate service facts ------------------------- 1.75s /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:3 linux-system-roles.vpn : Enable and restart vpn services ---------------- 0.88s /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:2 Gathering Facts --------------------------------------------------------- 0.77s /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:3 ------------ linux-system-roles.vpn : Check if secrets file already exists ----------- 0.61s /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:168 linux-system-roles.vpn : Enable and restart vpn services ---------------- 0.56s /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:2 Get and store conf files ------------------------------------------------ 0.48s /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:43 ----------- Stat secrets files paths ------------------------------------------------ 0.48s /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/assert_conf_secrets_files_exist.yml:8 Stat conf files paths --------------------------------------------------- 0.45s /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/assert_conf_secrets_files_exist.yml:2 Get and store secrets files --------------------------------------------- 0.43s /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:80 ----------- Create nss directory for testing ---------------------------------------- 0.31s /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/setup_test.yml:22 ------------------ Create /etc/ipsec.d directory for testing ------------------------------- 0.22s /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/setup_test.yml:28 ------------------ linux-system-roles.vpn : Set psks for hosts ----------------------------- 0.12s /WORKDIR/git-weekly-cihpe8_7u9/tests/roles/linux-system-roles.vpn/tasks/main.yml:136 Check for ansible_managed, fingerprint in generated files --------------- 0.08s /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:106 ---------- Check that conf file contains correct information ----------------------- 0.08s /WORKDIR/git-weekly-cihpe8_7u9/tests/tests_host_to_host_cert.yml:49 ----------- Check for presence of ansible managed header, fingerprint --------------- 0.08s /WORKDIR/git-weekly-cihpe8_7u9/tests/tasks/check_header.yml:9 ----------------- ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- /opt/ansible-2.9/lib/python3.6/site-packages/ansible/parsing/vault/__init__.py:44: CryptographyDeprecationWarning: Python 3.6 is no longer supported by the Python core team. Therefore, support for it is deprecated in cryptography. The next release of cryptography will remove support for Python 3.6. from cryptography.exceptions import InvalidSignature ---^---^---^---^---^---