ansible-playbook [core 2.12.6] config file = /etc/ansible/ansible.cfg configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/lib/python3.9/site-packages/ansible ansible collection location = /tmp/tmp6awxn9b3 executable location = /usr/bin/ansible-playbook python version = 3.9.13 (main, May 18 2022, 00:00:00) [GCC 11.3.1 20220421 (Red Hat 11.3.1-2)] jinja version = 2.11.3 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: rhel-7_setup.yml ***************************************************** 1 plays in /cache/rhel-7_setup.yml PLAY [Setup repos] ************************************************************* META: ran handlers TASK [set up internal repositories] ******************************************** task path: /cache/rhel-7_setup.yml:5 Friday 22 July 2022 00:20:48 +0000 (0:00:00.017) 0:00:00.018 *********** changed: [/cache/rhel-7.qcow2] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true } changed: [/cache/rhel-7.qcow2] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true } changed: [/cache/rhel-7.qcow2] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true } changed: [/cache/rhel-7.qcow2] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true } changed: [/cache/rhel-7.qcow2] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true } META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* /cache/rhel-7.qcow2 : ok=1 changed=1 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 Friday 22 July 2022 00:20:49 +0000 (0:00:01.388) 0:00:01.406 *********** =============================================================================== set up internal repositories -------------------------------------------- 1.39s /cache/rhel-7_setup.yml:5 ----------------------------------------------------- PLAYBOOK: tests_ansible.yml **************************************************** 1 plays in /tmp/tmpgfts__k2/tests/tests_ansible.yml PLAY [Ensure that the roles runs with default parameters] ********************** TASK [Gathering Facts] ********************************************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:1 Friday 22 July 2022 00:20:50 +0000 (0:00:00.049) 0:00:01.455 *********** ok: [/cache/rhel-7.qcow2] META: ran handlers TASK [linux-system-roles.firewall : include_tasks] ***************************** task path: /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/main.yml:1 Friday 22 July 2022 00:20:51 +0000 (0:00:00.968) 0:00:02.424 *********** included: /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml for /cache/rhel-7.qcow2 TASK [linux-system-roles.firewall : Ensure ansible_facts used by role] ********* task path: /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:2 Friday 22 July 2022 00:20:51 +0000 (0:00:00.029) 0:00:02.453 *********** ok: [/cache/rhel-7.qcow2] TASK [linux-system-roles.firewall : Install firewalld] ************************* task path: /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:8 Friday 22 July 2022 00:20:51 +0000 (0:00:00.405) 0:00:02.859 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "changes": { "installed": [ "firewalld" ] }, "rc": 0, "results": [ "Loaded plugins: search-disabled-repos\nResolving Dependencies\n--> Running transaction check\n---> Package firewalld.noarch 0:0.6.3-13.el7_9 will be installed\n--> Processing Dependency: python-firewall = 0.6.3-13.el7_9 for package: firewalld-0.6.3-13.el7_9.noarch\n--> Processing Dependency: firewalld-filesystem = 0.6.3-13.el7_9 for package: firewalld-0.6.3-13.el7_9.noarch\n--> Processing Dependency: ipset for package: firewalld-0.6.3-13.el7_9.noarch\n--> Processing Dependency: ebtables for package: firewalld-0.6.3-13.el7_9.noarch\n--> Running transaction check\n---> Package ebtables.x86_64 0:2.0.10-16.el7 will be installed\n---> Package firewalld-filesystem.noarch 0:0.6.3-13.el7_9 will be installed\n---> Package ipset.x86_64 0:7.1-1.el7 will be installed\n--> Processing Dependency: ipset-libs(x86-64) = 7.1-1.el7 for package: ipset-7.1-1.el7.x86_64\n--> Processing Dependency: libipset.so.13(LIBIPSET_4.8)(64bit) for package: ipset-7.1-1.el7.x86_64\n--> Processing Dependency: libipset.so.13(LIBIPSET_2.0)(64bit) for package: ipset-7.1-1.el7.x86_64\n--> Processing Dependency: libipset.so.13()(64bit) for package: ipset-7.1-1.el7.x86_64\n---> Package python-firewall.noarch 0:0.6.3-13.el7_9 will be installed\n--> Processing Dependency: python-slip-dbus for package: python-firewall-0.6.3-13.el7_9.noarch\n--> Running transaction check\n---> Package ipset-libs.x86_64 0:7.1-1.el7 will be installed\n---> Package python-slip-dbus.noarch 0:0.4.0-4.el7 will be installed\n--> Processing Dependency: python-slip = 0.4.0-4.el7 for package: python-slip-dbus-0.4.0-4.el7.noarch\n--> Running transaction check\n---> Package python-slip.noarch 0:0.4.0-4.el7 will be installed\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nInstalling:\n firewalld noarch 0.6.3-13.el7_9 rhel 449 k\nInstalling for dependencies:\n ebtables x86_64 2.0.10-16.el7 rhel 123 k\n firewalld-filesystem noarch 0.6.3-13.el7_9 rhel 51 k\n ipset x86_64 7.1-1.el7 rhel 39 k\n ipset-libs x86_64 7.1-1.el7 rhel 64 k\n python-firewall noarch 0.6.3-13.el7_9 rhel 355 k\n python-slip noarch 0.4.0-4.el7 rhel 31 k\n python-slip-dbus noarch 0.4.0-4.el7 rhel 32 k\n\nTransaction Summary\n================================================================================\nInstall 1 Package (+7 Dependent packages)\n\nTotal download size: 1.1 M\nInstalled size: 4.5 M\nDownloading packages:\n--------------------------------------------------------------------------------\nTotal 12 MB/s | 1.1 MB 00:00 \nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Installing : ebtables-2.0.10-16.el7.x86_64 1/8 \n Installing : ipset-libs-7.1-1.el7.x86_64 2/8 \n Installing : ipset-7.1-1.el7.x86_64 3/8 \n Installing : python-slip-0.4.0-4.el7.noarch 4/8 \n Installing : python-slip-dbus-0.4.0-4.el7.noarch 5/8 \n Installing : python-firewall-0.6.3-13.el7_9.noarch 6/8 \n Installing : firewalld-filesystem-0.6.3-13.el7_9.noarch 7/8 \n Installing : firewalld-0.6.3-13.el7_9.noarch 8/8 \n Verifying : ipset-7.1-1.el7.x86_64 1/8 \n Verifying : python-slip-dbus-0.4.0-4.el7.noarch 2/8 \n Verifying : firewalld-filesystem-0.6.3-13.el7_9.noarch 3/8 \n Verifying : firewalld-0.6.3-13.el7_9.noarch 4/8 \n Verifying : python-slip-0.4.0-4.el7.noarch 5/8 \n Verifying : python-firewall-0.6.3-13.el7_9.noarch 6/8 \n Verifying : ipset-libs-7.1-1.el7.x86_64 7/8 \n Verifying : ebtables-2.0.10-16.el7.x86_64 8/8 \n\nInstalled:\n firewalld.noarch 0:0.6.3-13.el7_9 \n\nDependency Installed:\n ebtables.x86_64 0:2.0.10-16.el7 \n firewalld-filesystem.noarch 0:0.6.3-13.el7_9 \n ipset.x86_64 0:7.1-1.el7 \n ipset-libs.x86_64 0:7.1-1.el7 \n python-firewall.noarch 0:0.6.3-13.el7_9 \n python-slip.noarch 0:0.4.0-4.el7 \n python-slip-dbus.noarch 0:0.4.0-4.el7 \n\nComplete!\n" ] } TASK [linux-system-roles.firewall : Install python-firewall] ******************* task path: /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:13 Friday 22 July 2022 00:20:56 +0000 (0:00:05.150) 0:00:08.009 *********** ok: [/cache/rhel-7.qcow2] => { "changed": false, "rc": 0, "results": [ "python-firewall-0.6.3-13.el7_9.noarch providing python-firewall is already installed" ] } TASK [linux-system-roles.firewall : Install python3-firewall] ****************** task path: /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:19 Friday 22 July 2022 00:20:57 +0000 (0:00:00.487) 0:00:08.497 *********** skipping: [/cache/rhel-7.qcow2] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Enable and start firewalld service] ******** task path: /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/main.yml:3 Friday 22 July 2022 00:20:57 +0000 (0:00:00.024) 0:00:08.521 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "dbus.service basic.target system.slice polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "multi-user.target shutdown.target network-pre.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "ebtables.service shutdown.target ip6tables.service iptables.service ipset.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "7150", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "7150", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [linux-system-roles.firewall : Check if previous replaced is defined] ***** task path: /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/main.yml:9 Friday 22 July 2022 00:20:57 +0000 (0:00:00.882) 0:00:09.404 *********** ok: [/cache/rhel-7.qcow2] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python" }, "changed": false } TASK [linux-system-roles.firewall : Get config files, checksums before and remove] *** task path: /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/main.yml:18 Friday 22 July 2022 00:20:58 +0000 (0:00:00.046) 0:00:09.450 *********** skipping: [/cache/rhel-7.qcow2] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Configure firewall] ************************ task path: /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/main.yml:40 Friday 22 July 2022 00:20:58 +0000 (0:00:00.036) 0:00:09.487 *********** TASK [linux-system-roles.firewall : Get config files, checksums after] ********* task path: /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/main.yml:77 Friday 22 July 2022 00:20:58 +0000 (0:00:00.033) 0:00:09.520 *********** skipping: [/cache/rhel-7.qcow2] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Calculate what has changed] **************** task path: /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/main.yml:85 Friday 22 July 2022 00:20:58 +0000 (0:00:00.030) 0:00:09.551 *********** skipping: [/cache/rhel-7.qcow2] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Show diffs] ******************************** task path: /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/main.yml:94 Friday 22 July 2022 00:20:58 +0000 (0:00:00.042) 0:00:09.593 *********** skipping: [/cache/rhel-7.qcow2] => {} META: role_complete for /cache/rhel-7.qcow2 TASK [Remove custom zone] ****************************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:14 Friday 22 July 2022 00:20:58 +0000 (0:00:00.039) 0:00:09.633 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--delete-zone=custom" ], "delta": "0:00:00.259215", "end": "2022-07-21 20:20:59.176623", "failed_when_result": false, "rc": 112, "start": "2022-07-21 20:20:58.917408" } STDERR: Error: INVALID_ZONE: custom MSG: non-zero return code TASK [Reset internal zone to defaults] ***************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:19 Friday 22 July 2022 00:20:58 +0000 (0:00:00.701) 0:00:10.334 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=internal" ], "delta": "0:00:00.281602", "end": "2022-07-21 20:20:59.769064", "failed_when_result": false, "rc": 22, "start": "2022-07-21 20:20:59.487462" } STDERR: Error: NO_DEFAULTS: internal MSG: non-zero return code TASK [Reset trusted zone to defaults] ****************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:24 Friday 22 July 2022 00:20:59 +0000 (0:00:00.590) 0:00:10.925 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=trusted" ], "delta": "0:00:00.258633", "end": "2022-07-21 20:21:00.333005", "failed_when_result": false, "rc": 22, "start": "2022-07-21 20:21:00.074372" } STDERR: Error: NO_DEFAULTS: trusted MSG: non-zero return code TASK [Reset dmz zone to defaults] ********************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:29 Friday 22 July 2022 00:21:00 +0000 (0:00:00.563) 0:00:11.489 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=dmz" ], "delta": "0:00:00.268033", "end": "2022-07-21 20:21:00.912349", "failed_when_result": false, "rc": 22, "start": "2022-07-21 20:21:00.644316" } STDERR: Error: NO_DEFAULTS: dmz MSG: non-zero return code TASK [Reset drop zone to defaults] ********************************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:34 Friday 22 July 2022 00:21:00 +0000 (0:00:00.577) 0:00:12.066 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=drop" ], "delta": "0:00:00.260344", "end": "2022-07-21 20:21:01.465364", "failed_when_result": false, "rc": 22, "start": "2022-07-21 20:21:01.205020" } STDERR: Error: NO_DEFAULTS: drop MSG: non-zero return code TASK [Reset public zone to defaults] ******************************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:39 Friday 22 July 2022 00:21:01 +0000 (0:00:00.554) 0:00:12.621 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=public" ], "delta": "0:00:00.273523", "end": "2022-07-21 20:21:02.040689", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:21:01.767166" } STDOUT: success TASK [Reset default zone to defaults] ****************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:44 Friday 22 July 2022 00:21:01 +0000 (0:00:00.577) 0:00:13.198 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": "zone=$(firewall-cmd --get-default-zone)\nfirewall-cmd --permanent --load-zone-defaults=$zone\n", "delta": "0:00:00.532192", "end": "2022-07-21 20:21:02.912944", "failed_when_result": false, "rc": 22, "start": "2022-07-21 20:21:02.380752" } STDERR: Error: NO_DEFAULTS: public MSG: non-zero return code TASK [Create custom zone] ****************************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:52 Friday 22 July 2022 00:21:02 +0000 (0:00:00.868) 0:00:14.067 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--new-zone=custom" ], "delta": "0:00:00.244852", "end": "2022-07-21 20:21:03.492100", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:21:03.247248" } STDOUT: success TASK [Reload firewalld] ******************************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:57 Friday 22 July 2022 00:21:03 +0000 (0:00:00.590) 0:00:14.657 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--reload" ], "delta": "0:00:00.487967", "end": "2022-07-21 20:21:04.341091", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:21:03.853124" } STDOUT: success TASK [Permit traffic in default zone for https service] ************************ task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:64 Friday 22 July 2022 00:21:04 +0000 (0:00:00.840) 0:00:15.497 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Permit traffic in default zone for https service, again] ***************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:72 Friday 22 July 2022 00:21:04 +0000 (0:00:00.602) 0:00:16.100 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Permit traffic in default zone on port 8081/tcp] ************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:80 Friday 22 July 2022 00:21:05 +0000 (0:00:00.505) 0:00:16.605 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Permit traffic in default zone on port 8081/tcp, again] ****************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:88 Friday 22 July 2022 00:21:05 +0000 (0:00:00.493) 0:00:17.098 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Allow port 161-162/udp in permanent default zone] ************************ task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:96 Friday 22 July 2022 00:21:06 +0000 (0:00:00.513) 0:00:17.612 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Allow port 161-162/udp in permanent default zone, again] ***************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:104 Friday 22 July 2022 00:21:06 +0000 (0:00:00.494) 0:00:18.106 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Do not permit traffic in default zone on port 8081/tcp] ****************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:112 Friday 22 July 2022 00:21:07 +0000 (0:00:00.495) 0:00:18.601 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Do not permit traffic in default zone on port 8081/tcp, again] *********** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:120 Friday 22 July 2022 00:21:07 +0000 (0:00:00.511) 0:00:19.113 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Allow service http in permanent dmz zone] ******************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:128 Friday 22 July 2022 00:21:08 +0000 (0:00:00.500) 0:00:19.613 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Allow service http in permanent dmz zone, again] ************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:137 Friday 22 July 2022 00:21:08 +0000 (0:00:00.507) 0:00:20.120 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Allow service ftp with limitation using rich rule in permanent default zone] *** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:146 Friday 22 July 2022 00:21:09 +0000 (0:00:00.494) 0:00:20.615 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Allow service ftp with limitation using rich rule in permanent default zone, again] *** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:155 Friday 22 July 2022 00:21:09 +0000 (0:00:00.505) 0:00:21.120 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Allow source 192.0.2.0/24 in internal zone] ****************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:164 Friday 22 July 2022 00:21:10 +0000 (0:00:00.519) 0:00:21.640 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Allow source 192.0.2.0/24 in internal zone, again] *********************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:173 Friday 22 July 2022 00:21:10 +0000 (0:00:00.504) 0:00:22.144 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Allow interface eth2 in permanent trusted zone] ************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:182 Friday 22 July 2022 00:21:11 +0000 (0:00:00.513) 0:00:22.658 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Allow interface eth2 in permanent trusted zone, again] ******************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:191 Friday 22 July 2022 00:21:11 +0000 (0:00:00.512) 0:00:23.170 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Allow masquerading in permament dmz zone] ******************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:200 Friday 22 July 2022 00:21:12 +0000 (0:00:00.527) 0:00:23.698 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Allow masquerading in permament dmz zone, again] ************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:208 Friday 22 July 2022 00:21:12 +0000 (0:00:00.564) 0:00:24.263 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Ensure permanent custom zone exists (no change)] ************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:216 Friday 22 July 2022 00:21:13 +0000 (0:00:00.504) 0:00:24.767 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Ensure ICMP block inversion in permanent drop zone] ********************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:224 Friday 22 July 2022 00:21:13 +0000 (0:00:00.511) 0:00:25.278 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Ensure ICMP block inversion in permanent drop zone, again] *************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:232 Friday 22 July 2022 00:21:14 +0000 (0:00:00.503) 0:00:25.781 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Block ICMP echo-request in permanent drop zone] ************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:240 Friday 22 July 2022 00:21:14 +0000 (0:00:00.501) 0:00:26.282 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Block ICMP echo-request in permanent drop zone, again] ******************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:249 Friday 22 July 2022 00:21:15 +0000 (0:00:00.495) 0:00:26.777 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Ensure default target in permanent internal zone (no change)] ************ task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:258 Friday 22 July 2022 00:21:15 +0000 (0:00:00.527) 0:00:27.304 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Ensure target ACCEPT in permanent internal zone] ************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:267 Friday 22 July 2022 00:21:16 +0000 (0:00:00.613) 0:00:27.918 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Ensure target ACCEPT in permanent internal zone, again] ****************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:276 Friday 22 July 2022 00:21:17 +0000 (0:00:00.751) 0:00:28.670 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Ensure default target in permanent internal zone] ************************ task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:285 Friday 22 July 2022 00:21:17 +0000 (0:00:00.506) 0:00:29.176 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Ensure default target in permanent internal zone, again] ***************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:294 Friday 22 July 2022 00:21:18 +0000 (0:00:00.767) 0:00:29.944 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Redirect port 443 to 8443 with Rich Rule in permanent and runtime public zone] *** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:303 Friday 22 July 2022 00:21:19 +0000 (0:00:00.512) 0:00:30.457 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Redirect port 443 to 8443 with Rich Rule in permanent and runtime public zone, again] *** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:315 Friday 22 July 2022 00:21:19 +0000 (0:00:00.556) 0:00:31.013 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Firewalld custom zone] *************************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:327 Friday 22 July 2022 00:21:20 +0000 (0:00:00.529) 0:00:31.543 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true } TASK [assert firewalld custom zone] ******************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:335 Friday 22 July 2022 00:21:20 +0000 (0:00:00.712) 0:00:32.255 *********** ok: [/cache/rhel-7.qcow2] => { "changed": false } MSG: All assertions passed TASK [Add masquerade to custom zone] ******************************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:340 Friday 22 July 2022 00:21:20 +0000 (0:00:00.065) 0:00:32.321 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Add masquerade to custom zone, again] ************************************ task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:350 Friday 22 July 2022 00:21:21 +0000 (0:00:00.538) 0:00:32.859 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Set the default zone to something other than dmz] ************************ task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:360 Friday 22 July 2022 00:21:21 +0000 (0:00:00.533) 0:00:33.393 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--set-default-zone", "public" ], "delta": "0:00:00.253704", "end": "2022-07-21 20:21:22.796954", "rc": 0, "start": "2022-07-21 20:21:22.543250" } STDOUT: success STDERR: Warning: ZONE_ALREADY_SET: public TASK [set default zone] ******************************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:363 Friday 22 July 2022 00:21:22 +0000 (0:00:00.558) 0:00:33.951 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [set default zone, again] ************************************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:370 Friday 22 July 2022 00:21:23 +0000 (0:00:00.570) 0:00:34.522 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [add multiple custom services] ******************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:377 Friday 22 July 2022 00:21:23 +0000 (0:00:00.492) 0:00:35.015 *********** ok: [/cache/rhel-7.qcow2] => { "changed": false, "failed_when_result": false } MSG: can only add, modify, or remove one service at a time TASK [add custom service without details] ************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:387 Friday 22 July 2022 00:21:23 +0000 (0:00:00.387) 0:00:35.403 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [add custom service that already exists] ********************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:395 Friday 22 July 2022 00:21:24 +0000 (0:00:00.759) 0:00:36.162 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [add description to custom service] *************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:403 Friday 22 July 2022 00:21:25 +0000 (0:00:00.535) 0:00:36.698 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [add short description to custom service] ********************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:412 Friday 22 July 2022 00:21:26 +0000 (0:00:00.760) 0:00:37.458 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [add source_ports to custom service] ************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:421 Friday 22 July 2022 00:21:26 +0000 (0:00:00.747) 0:00:38.206 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [add source_ports to custom service again] ******************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:430 Friday 22 July 2022 00:21:27 +0000 (0:00:00.749) 0:00:38.956 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [add invalid protocol to custom service] ********************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:439 Friday 22 July 2022 00:21:28 +0000 (0:00:00.531) 0:00:39.488 *********** ok: [/cache/rhel-7.qcow2] => { "changed": false, "failed_when_result": false } MSG: INVALID_PROTOCOL: nonexistentprotocol TASK [add valid protocol to custom service] ************************************ task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:448 Friday 22 July 2022 00:21:28 +0000 (0:00:00.519) 0:00:40.007 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [remove valid protocol from customservice] ******************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:457 Friday 22 July 2022 00:21:29 +0000 (0:00:00.751) 0:00:40.759 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [remove ports from custom service without deleting service] *************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:466 Friday 22 July 2022 00:21:30 +0000 (0:00:00.756) 0:00:41.515 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [add destination addresses] *********************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:475 Friday 22 July 2022 00:21:30 +0000 (0:00:00.751) 0:00:42.267 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [delete custom service] *************************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:486 Friday 22 July 2022 00:21:31 +0000 (0:00:00.741) 0:00:43.009 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [delete custom service again] ********************************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:494 Friday 22 July 2022 00:21:32 +0000 (0:00:00.763) 0:00:43.772 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [add custom service with all the elements at once] ************************ task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:502 Friday 22 July 2022 00:21:32 +0000 (0:00:00.510) 0:00:44.283 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [add helper module that already is on customservice] ********************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:519 Friday 22 July 2022 00:21:33 +0000 (0:00:00.746) 0:00:45.029 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [forward port 40 to 0.0.0.0:8080 (string)] ******************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:528 Friday 22 July 2022 00:21:34 +0000 (0:00:00.523) 0:00:45.552 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [forward same port again (string)] **************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:535 Friday 22 July 2022 00:21:34 +0000 (0:00:00.539) 0:00:46.092 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [disable forward port (string)] ******************************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:542 Friday 22 July 2022 00:21:35 +0000 (0:00:00.511) 0:00:46.603 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [forward port (dict form)] ************************************************ task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:549 Friday 22 July 2022 00:21:35 +0000 (0:00:00.504) 0:00:47.107 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [forward port again (dict form)] ****************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:560 Friday 22 July 2022 00:21:36 +0000 (0:00:00.530) 0:00:47.638 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [disable forward port (dict form)] **************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:571 Friday 22 July 2022 00:21:36 +0000 (0:00:00.529) 0:00:48.167 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Remove custom zone] ****************************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:590 Friday 22 July 2022 00:21:37 +0000 (0:00:00.509) 0:00:48.677 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--delete-zone=custom" ], "delta": "0:00:00.266834", "end": "2022-07-21 20:21:38.136097", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:21:37.869263" } STDOUT: success TASK [Remove customzone zone] ************************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:595 Friday 22 July 2022 00:21:37 +0000 (0:00:00.615) 0:00:49.293 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--delete-zone=customzone" ], "delta": "0:00:00.283056", "end": "2022-07-21 20:21:38.771254", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:21:38.488198" } STDOUT: success TASK [Reset internal zone to defaults] ***************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:600 Friday 22 July 2022 00:21:38 +0000 (0:00:00.636) 0:00:49.929 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=internal" ], "delta": "0:00:00.289151", "end": "2022-07-21 20:21:39.399846", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:21:39.110695" } STDOUT: success TASK [Reset trusted zone to defaults] ****************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:605 Friday 22 July 2022 00:21:39 +0000 (0:00:00.628) 0:00:50.558 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=trusted" ], "delta": "0:00:00.267640", "end": "2022-07-21 20:21:40.007630", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:21:39.739990" } STDOUT: success TASK [Reset dmz zone to defaults] ********************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:610 Friday 22 July 2022 00:21:39 +0000 (0:00:00.606) 0:00:51.164 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=dmz" ], "delta": "0:00:00.299116", "end": "2022-07-21 20:21:40.645930", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:21:40.346814" } STDOUT: success TASK [Reset drop zone to defaults] ********************************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:615 Friday 22 July 2022 00:21:40 +0000 (0:00:00.642) 0:00:51.807 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=drop" ], "delta": "0:00:00.265902", "end": "2022-07-21 20:21:41.255983", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:21:40.990081" } STDOUT: success TASK [Reset public zone to defaults] ******************************************* task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:620 Friday 22 July 2022 00:21:40 +0000 (0:00:00.608) 0:00:52.415 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=public" ], "delta": "0:00:00.288423", "end": "2022-07-21 20:21:41.900299", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:21:41.611876" } STDOUT: success TASK [Reset default zone to defaults] ****************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:625 Friday 22 July 2022 00:21:41 +0000 (0:00:00.641) 0:00:53.056 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=public" ], "delta": "0:00:00.266458", "end": "2022-07-21 20:21:42.470291", "failed_when_result": false, "rc": 22, "start": "2022-07-21 20:21:42.203833" } STDERR: Error: NO_DEFAULTS: public MSG: non-zero return code TASK [Reload firewalld] ******************************************************** task path: /tmp/tmpgfts__k2/tests/tests_ansible.yml:630 Friday 22 July 2022 00:21:42 +0000 (0:00:00.571) 0:00:53.627 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--reload" ], "delta": "0:00:00.460244", "end": "2022-07-21 20:21:43.235226", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:21:42.774982" } STDOUT: success META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* /cache/rhel-7.qcow2 : ok=85 changed=53 unreachable=0 failed=0 skipped=6 rescued=0 ignored=0 Friday 22 July 2022 00:21:42 +0000 (0:00:00.772) 0:00:54.400 *********** =============================================================================== linux-system-roles.firewall : Install firewalld ------------------------- 5.15s /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:8 set up internal repositories -------------------------------------------- 1.39s /cache/rhel-7_setup.yml:5 ----------------------------------------------------- Gathering Facts --------------------------------------------------------- 0.97s /tmp/tmpgfts__k2/tests/tests_ansible.yml:1 ------------------------------------ linux-system-roles.firewall : Enable and start firewalld service -------- 0.88s /tmp/tmpgfts__k2/tests/roles/linux-system-roles.firewall/tasks/main.yml:3 ----- Reset default zone to defaults ------------------------------------------ 0.87s /tmp/tmpgfts__k2/tests/tests_ansible.yml:44 ----------------------------------- Reload firewalld -------------------------------------------------------- 0.84s /tmp/tmpgfts__k2/tests/tests_ansible.yml:57 ----------------------------------- Reload firewalld -------------------------------------------------------- 0.77s /tmp/tmpgfts__k2/tests/tests_ansible.yml:630 ---------------------------------- Ensure default target in permanent internal zone ------------------------ 0.77s /tmp/tmpgfts__k2/tests/tests_ansible.yml:285 ---------------------------------- delete custom service --------------------------------------------------- 0.76s /tmp/tmpgfts__k2/tests/tests_ansible.yml:486 ---------------------------------- add description to custom service --------------------------------------- 0.76s /tmp/tmpgfts__k2/tests/tests_ansible.yml:403 ---------------------------------- add custom service without details -------------------------------------- 0.76s /tmp/tmpgfts__k2/tests/tests_ansible.yml:387 ---------------------------------- remove valid protocol from customservice -------------------------------- 0.76s /tmp/tmpgfts__k2/tests/tests_ansible.yml:457 ---------------------------------- add valid protocol to custom service ------------------------------------ 0.75s /tmp/tmpgfts__k2/tests/tests_ansible.yml:448 ---------------------------------- remove ports from custom service without deleting service --------------- 0.75s /tmp/tmpgfts__k2/tests/tests_ansible.yml:466 ---------------------------------- Ensure target ACCEPT in permanent internal zone ------------------------- 0.75s /tmp/tmpgfts__k2/tests/tests_ansible.yml:267 ---------------------------------- add source_ports to custom service -------------------------------------- 0.75s /tmp/tmpgfts__k2/tests/tests_ansible.yml:421 ---------------------------------- add short description to custom service --------------------------------- 0.75s /tmp/tmpgfts__k2/tests/tests_ansible.yml:412 ---------------------------------- add custom service with all the elements at once ------------------------ 0.75s /tmp/tmpgfts__k2/tests/tests_ansible.yml:502 ---------------------------------- add destination addresses ----------------------------------------------- 0.74s /tmp/tmpgfts__k2/tests/tests_ansible.yml:475 ---------------------------------- Firewalld custom zone --------------------------------------------------- 0.71s /tmp/tmpgfts__k2/tests/tests_ansible.yml:327 ---------------------------------- ansible-playbook [core 2.12.6] config file = /etc/ansible/ansible.cfg configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/lib/python3.9/site-packages/ansible ansible collection location = /tmp/tmp6awxn9b3 executable location = /usr/bin/ansible-playbook python version = 3.9.13 (main, May 18 2022, 00:00:00) [GCC 11.3.1 20220421 (Red Hat 11.3.1-2)] jinja version = 2.11.3 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: rhel-7_setup.yml ***************************************************** 1 plays in /cache/rhel-7_setup.yml PLAY [Setup repos] ************************************************************* META: ran handlers TASK [set up internal repositories] ******************************************** task path: /cache/rhel-7_setup.yml:5 Friday 22 July 2022 00:24:50 +0000 (0:00:00.018) 0:00:00.018 *********** changed: [/cache/rhel-7.qcow2] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true } changed: [/cache/rhel-7.qcow2] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true } changed: [/cache/rhel-7.qcow2] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true } changed: [/cache/rhel-7.qcow2] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true } changed: [/cache/rhel-7.qcow2] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true } META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* /cache/rhel-7.qcow2 : ok=1 changed=1 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 Friday 22 July 2022 00:24:51 +0000 (0:00:01.411) 0:00:01.429 *********** =============================================================================== set up internal repositories -------------------------------------------- 1.41s /cache/rhel-7_setup.yml:5 ----------------------------------------------------- PLAYBOOK: tests_ansible.yml **************************************************** 1 plays in /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml PLAY [Ensure that the roles runs with default parameters] ********************** TASK [Gathering Facts] ********************************************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:1 Friday 22 July 2022 00:24:51 +0000 (0:00:00.069) 0:00:01.499 *********** ok: [/cache/rhel-7.qcow2] META: ran handlers TASK [fedora.linux_system_roles.firewall : include_tasks] ********************** task path: /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:1 Friday 22 July 2022 00:24:52 +0000 (0:00:00.961) 0:00:02.460 *********** included: /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for /cache/rhel-7.qcow2 TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Friday 22 July 2022 00:24:52 +0000 (0:00:00.028) 0:00:02.489 *********** ok: [/cache/rhel-7.qcow2] TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:7 Friday 22 July 2022 00:24:53 +0000 (0:00:00.410) 0:00:02.900 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "changes": { "installed": [ "firewalld" ] }, "rc": 0, "results": [ "Loaded plugins: search-disabled-repos\nResolving Dependencies\n--> Running transaction check\n---> Package firewalld.noarch 0:0.6.3-13.el7_9 will be installed\n--> Processing Dependency: python-firewall = 0.6.3-13.el7_9 for package: firewalld-0.6.3-13.el7_9.noarch\n--> Processing Dependency: firewalld-filesystem = 0.6.3-13.el7_9 for package: firewalld-0.6.3-13.el7_9.noarch\n--> Processing Dependency: ipset for package: firewalld-0.6.3-13.el7_9.noarch\n--> Processing Dependency: ebtables for package: firewalld-0.6.3-13.el7_9.noarch\n--> Running transaction check\n---> Package ebtables.x86_64 0:2.0.10-16.el7 will be installed\n---> Package firewalld-filesystem.noarch 0:0.6.3-13.el7_9 will be installed\n---> Package ipset.x86_64 0:7.1-1.el7 will be installed\n--> Processing Dependency: ipset-libs(x86-64) = 7.1-1.el7 for package: ipset-7.1-1.el7.x86_64\n--> Processing Dependency: libipset.so.13(LIBIPSET_4.8)(64bit) for package: ipset-7.1-1.el7.x86_64\n--> Processing Dependency: libipset.so.13(LIBIPSET_2.0)(64bit) for package: ipset-7.1-1.el7.x86_64\n--> Processing Dependency: libipset.so.13()(64bit) for package: ipset-7.1-1.el7.x86_64\n---> Package python-firewall.noarch 0:0.6.3-13.el7_9 will be installed\n--> Processing Dependency: python-slip-dbus for package: python-firewall-0.6.3-13.el7_9.noarch\n--> Running transaction check\n---> Package ipset-libs.x86_64 0:7.1-1.el7 will be installed\n---> Package python-slip-dbus.noarch 0:0.4.0-4.el7 will be installed\n--> Processing Dependency: python-slip = 0.4.0-4.el7 for package: python-slip-dbus-0.4.0-4.el7.noarch\n--> Running transaction check\n---> Package python-slip.noarch 0:0.4.0-4.el7 will be installed\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nInstalling:\n firewalld noarch 0.6.3-13.el7_9 rhel 449 k\nInstalling for dependencies:\n ebtables x86_64 2.0.10-16.el7 rhel 123 k\n firewalld-filesystem noarch 0.6.3-13.el7_9 rhel 51 k\n ipset x86_64 7.1-1.el7 rhel 39 k\n ipset-libs x86_64 7.1-1.el7 rhel 64 k\n python-firewall noarch 0.6.3-13.el7_9 rhel 355 k\n python-slip noarch 0.4.0-4.el7 rhel 31 k\n python-slip-dbus noarch 0.4.0-4.el7 rhel 32 k\n\nTransaction Summary\n================================================================================\nInstall 1 Package (+7 Dependent packages)\n\nTotal download size: 1.1 M\nInstalled size: 4.5 M\nDownloading packages:\n--------------------------------------------------------------------------------\nTotal 9.0 MB/s | 1.1 MB 00:00 \nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Installing : ebtables-2.0.10-16.el7.x86_64 1/8 \n Installing : ipset-libs-7.1-1.el7.x86_64 2/8 \n Installing : ipset-7.1-1.el7.x86_64 3/8 \n Installing : python-slip-0.4.0-4.el7.noarch 4/8 \n Installing : python-slip-dbus-0.4.0-4.el7.noarch 5/8 \n Installing : python-firewall-0.6.3-13.el7_9.noarch 6/8 \n Installing : firewalld-filesystem-0.6.3-13.el7_9.noarch 7/8 \n Installing : firewalld-0.6.3-13.el7_9.noarch 8/8 \n Verifying : ipset-7.1-1.el7.x86_64 1/8 \n Verifying : python-slip-dbus-0.4.0-4.el7.noarch 2/8 \n Verifying : firewalld-filesystem-0.6.3-13.el7_9.noarch 3/8 \n Verifying : firewalld-0.6.3-13.el7_9.noarch 4/8 \n Verifying : python-slip-0.4.0-4.el7.noarch 5/8 \n Verifying : python-firewall-0.6.3-13.el7_9.noarch 6/8 \n Verifying : ipset-libs-7.1-1.el7.x86_64 7/8 \n Verifying : ebtables-2.0.10-16.el7.x86_64 8/8 \n\nInstalled:\n firewalld.noarch 0:0.6.3-13.el7_9 \n\nDependency Installed:\n ebtables.x86_64 0:2.0.10-16.el7 \n firewalld-filesystem.noarch 0:0.6.3-13.el7_9 \n ipset.x86_64 0:7.1-1.el7 \n ipset-libs.x86_64 0:7.1-1.el7 \n python-firewall.noarch 0:0.6.3-13.el7_9 \n python-slip.noarch 0:0.4.0-4.el7 \n python-slip-dbus.noarch 0:0.4.0-4.el7 \n\nComplete!\n" ] } TASK [fedora.linux_system_roles.firewall : Install python-firewall] ************ task path: /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:12 Friday 22 July 2022 00:24:58 +0000 (0:00:05.219) 0:00:08.119 *********** ok: [/cache/rhel-7.qcow2] => { "changed": false, "rc": 0, "results": [ "python-firewall-0.6.3-13.el7_9.noarch providing python-firewall is already installed" ] } TASK [fedora.linux_system_roles.firewall : Install python3-firewall] *********** task path: /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:18 Friday 22 July 2022 00:24:58 +0000 (0:00:00.541) 0:00:08.660 *********** skipping: [/cache/rhel-7.qcow2] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:3 Friday 22 July 2022 00:24:58 +0000 (0:00:00.025) 0:00:08.686 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "basic.target dbus.service system.slice polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target multi-user.target network-pre.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "iptables.service ipset.service ip6tables.service ebtables.service shutdown.target", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "7150", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "7150", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Friday 22 July 2022 00:24:59 +0000 (0:00:00.890) 0:00:09.576 *********** ok: [/cache/rhel-7.qcow2] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python" }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:14 Friday 22 July 2022 00:24:59 +0000 (0:00:00.053) 0:00:09.630 *********** skipping: [/cache/rhel-7.qcow2] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:36 Friday 22 July 2022 00:24:59 +0000 (0:00:00.035) 0:00:09.665 *********** TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Friday 22 July 2022 00:24:59 +0000 (0:00:00.038) 0:00:09.703 *********** skipping: [/cache/rhel-7.qcow2] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:79 Friday 22 July 2022 00:24:59 +0000 (0:00:00.039) 0:00:09.743 *********** skipping: [/cache/rhel-7.qcow2] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:85 Friday 22 July 2022 00:24:59 +0000 (0:00:00.035) 0:00:09.778 *********** skipping: [/cache/rhel-7.qcow2] => {} META: role_complete for /cache/rhel-7.qcow2 TASK [Remove custom zone] ****************************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:14 Friday 22 July 2022 00:24:59 +0000 (0:00:00.042) 0:00:09.820 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--delete-zone=custom" ], "delta": "0:00:00.268412", "end": "2022-07-21 20:25:02.064772", "failed_when_result": false, "rc": 112, "start": "2022-07-21 20:25:01.796360" } STDERR: Error: INVALID_ZONE: custom MSG: non-zero return code TASK [Reset internal zone to defaults] ***************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:19 Friday 22 July 2022 00:25:02 +0000 (0:00:02.378) 0:00:12.199 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=internal" ], "delta": "0:00:00.289452", "end": "2022-07-21 20:25:02.660928", "failed_when_result": false, "rc": 22, "start": "2022-07-21 20:25:02.371476" } STDERR: Error: NO_DEFAULTS: internal MSG: non-zero return code TASK [Reset trusted zone to defaults] ****************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:24 Friday 22 July 2022 00:25:02 +0000 (0:00:00.596) 0:00:12.796 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=trusted" ], "delta": "0:00:00.273443", "end": "2022-07-21 20:25:03.238905", "failed_when_result": false, "rc": 22, "start": "2022-07-21 20:25:02.965462" } STDERR: Error: NO_DEFAULTS: trusted MSG: non-zero return code TASK [Reset dmz zone to defaults] ********************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:29 Friday 22 July 2022 00:25:03 +0000 (0:00:00.595) 0:00:13.392 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=dmz" ], "delta": "0:00:00.284524", "end": "2022-07-21 20:25:03.857191", "failed_when_result": false, "rc": 22, "start": "2022-07-21 20:25:03.572667" } STDERR: Error: NO_DEFAULTS: dmz MSG: non-zero return code TASK [Reset drop zone to defaults] ********************************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:34 Friday 22 July 2022 00:25:04 +0000 (0:00:00.600) 0:00:13.992 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=drop" ], "delta": "0:00:00.279899", "end": "2022-07-21 20:25:04.439547", "failed_when_result": false, "rc": 22, "start": "2022-07-21 20:25:04.159648" } STDERR: Error: NO_DEFAULTS: drop MSG: non-zero return code TASK [Reset public zone to defaults] ******************************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:39 Friday 22 July 2022 00:25:04 +0000 (0:00:00.581) 0:00:14.574 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=public" ], "delta": "0:00:00.311200", "end": "2022-07-21 20:25:05.059481", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:25:04.748281" } STDOUT: success TASK [Reset default zone to defaults] ****************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:44 Friday 22 July 2022 00:25:05 +0000 (0:00:00.624) 0:00:15.198 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": "zone=$(firewall-cmd --get-default-zone)\nfirewall-cmd --permanent --load-zone-defaults=$zone\n", "delta": "0:00:00.525153", "end": "2022-07-21 20:25:05.896348", "failed_when_result": false, "rc": 22, "start": "2022-07-21 20:25:05.371195" } STDERR: Error: NO_DEFAULTS: public MSG: non-zero return code TASK [Create custom zone] ****************************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:52 Friday 22 July 2022 00:25:06 +0000 (0:00:00.835) 0:00:16.034 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--new-zone=custom" ], "delta": "0:00:00.251058", "end": "2022-07-21 20:25:06.450440", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:25:06.199382" } STDOUT: success TASK [Reload firewalld] ******************************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:57 Friday 22 July 2022 00:25:06 +0000 (0:00:00.551) 0:00:16.585 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--reload" ], "delta": "0:00:00.469512", "end": "2022-07-21 20:25:07.232722", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:25:06.763210" } STDOUT: success TASK [Permit traffic in default zone for https service] ************************ task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:64 Friday 22 July 2022 00:25:07 +0000 (0:00:00.785) 0:00:17.370 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Permit traffic in default zone for https service, again] ***************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:72 Friday 22 July 2022 00:25:08 +0000 (0:00:00.639) 0:00:18.010 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Permit traffic in default zone on port 8081/tcp] ************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:80 Friday 22 July 2022 00:25:08 +0000 (0:00:00.504) 0:00:18.514 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Permit traffic in default zone on port 8081/tcp, again] ****************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:88 Friday 22 July 2022 00:25:09 +0000 (0:00:00.530) 0:00:19.045 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Allow port 161-162/udp in permanent default zone] ************************ task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:96 Friday 22 July 2022 00:25:09 +0000 (0:00:00.508) 0:00:19.553 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Allow port 161-162/udp in permanent default zone, again] ***************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:104 Friday 22 July 2022 00:25:10 +0000 (0:00:00.512) 0:00:20.065 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Do not permit traffic in default zone on port 8081/tcp] ****************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:112 Friday 22 July 2022 00:25:10 +0000 (0:00:00.509) 0:00:20.574 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Do not permit traffic in default zone on port 8081/tcp, again] *********** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:120 Friday 22 July 2022 00:25:11 +0000 (0:00:00.504) 0:00:21.079 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Allow service http in permanent dmz zone] ******************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:128 Friday 22 July 2022 00:25:11 +0000 (0:00:00.514) 0:00:21.594 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Allow service http in permanent dmz zone, again] ************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:137 Friday 22 July 2022 00:25:12 +0000 (0:00:00.499) 0:00:22.094 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Allow service ftp with limitation using rich rule in permanent default zone] *** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:146 Friday 22 July 2022 00:25:12 +0000 (0:00:00.521) 0:00:22.615 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Allow service ftp with limitation using rich rule in permanent default zone, again] *** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:154 Friday 22 July 2022 00:25:13 +0000 (0:00:00.513) 0:00:23.129 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Allow source 192.0.2.0/24 in internal zone] ****************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:162 Friday 22 July 2022 00:25:13 +0000 (0:00:00.581) 0:00:23.710 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Allow source 192.0.2.0/24 in internal zone, again] *********************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:171 Friday 22 July 2022 00:25:14 +0000 (0:00:00.513) 0:00:24.224 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Allow interface eth2 in permanent trusted zone] ************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:180 Friday 22 July 2022 00:25:14 +0000 (0:00:00.507) 0:00:24.731 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Allow interface eth2 in permanent trusted zone, again] ******************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:189 Friday 22 July 2022 00:25:15 +0000 (0:00:00.576) 0:00:25.308 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Allow masquerading in permament dmz zone] ******************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:198 Friday 22 July 2022 00:25:16 +0000 (0:00:00.580) 0:00:25.888 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Allow masquerading in permament dmz zone, again] ************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:206 Friday 22 July 2022 00:25:16 +0000 (0:00:00.539) 0:00:26.428 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Ensure permanent custom zone exists (no change)] ************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:214 Friday 22 July 2022 00:25:17 +0000 (0:00:00.545) 0:00:26.973 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Ensure ICMP block inversion in permanent drop zone] ********************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:222 Friday 22 July 2022 00:25:17 +0000 (0:00:00.510) 0:00:27.483 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Ensure ICMP block inversion in permanent drop zone, again] *************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:230 Friday 22 July 2022 00:25:18 +0000 (0:00:00.566) 0:00:28.050 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Block ICMP echo-request in permanent drop zone] ************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:238 Friday 22 July 2022 00:25:18 +0000 (0:00:00.537) 0:00:28.587 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Block ICMP echo-request in permanent drop zone, again] ******************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:247 Friday 22 July 2022 00:25:19 +0000 (0:00:00.518) 0:00:29.105 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Ensure default target in permanent internal zone (no change)] ************ task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:256 Friday 22 July 2022 00:25:19 +0000 (0:00:00.503) 0:00:29.609 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Ensure target ACCEPT in permanent internal zone] ************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:265 Friday 22 July 2022 00:25:20 +0000 (0:00:00.516) 0:00:30.125 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Ensure target ACCEPT in permanent internal zone, again] ****************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:274 Friday 22 July 2022 00:25:21 +0000 (0:00:00.757) 0:00:30.883 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Ensure default target in permanent internal zone] ************************ task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:283 Friday 22 July 2022 00:25:21 +0000 (0:00:00.500) 0:00:31.384 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Ensure default target in permanent internal zone, again] ***************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:292 Friday 22 July 2022 00:25:22 +0000 (0:00:00.754) 0:00:32.138 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Redirect port 443 to 8443 with Rich Rule in permanent and runtime public zone] *** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:301 Friday 22 July 2022 00:25:22 +0000 (0:00:00.526) 0:00:32.664 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Redirect port 443 to 8443 with Rich Rule in permanent and runtime public zone, again] *** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:311 Friday 22 July 2022 00:25:23 +0000 (0:00:00.539) 0:00:33.203 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Firewalld custom zone] *************************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:321 Friday 22 July 2022 00:25:23 +0000 (0:00:00.532) 0:00:33.736 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true } TASK [assert firewalld custom zone] ******************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:329 Friday 22 July 2022 00:25:24 +0000 (0:00:00.758) 0:00:34.494 *********** ok: [/cache/rhel-7.qcow2] => { "changed": false } MSG: All assertions passed TASK [Add masquerade to custom zone] ******************************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:334 Friday 22 July 2022 00:25:24 +0000 (0:00:00.034) 0:00:34.529 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Add masquerade to custom zone, again] ************************************ task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:344 Friday 22 July 2022 00:25:25 +0000 (0:00:00.522) 0:00:35.051 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [Set the default zone to something other than dmz] ************************ task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:354 Friday 22 July 2022 00:25:25 +0000 (0:00:00.526) 0:00:35.578 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--set-default-zone", "public" ], "delta": "0:00:00.266280", "end": "2022-07-21 20:25:26.014845", "rc": 0, "start": "2022-07-21 20:25:25.748565" } STDOUT: success STDERR: Warning: ZONE_ALREADY_SET: public TASK [set default zone] ******************************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:357 Friday 22 July 2022 00:25:26 +0000 (0:00:00.570) 0:00:36.148 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [set default zone, again] ************************************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:364 Friday 22 July 2022 00:25:26 +0000 (0:00:00.568) 0:00:36.717 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [add multiple custom services] ******************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:371 Friday 22 July 2022 00:25:27 +0000 (0:00:00.518) 0:00:37.235 *********** ok: [/cache/rhel-7.qcow2] => { "changed": false, "failed_when_result": false } MSG: can only add, modify, or remove one service at a time TASK [add custom service without details] ************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:381 Friday 22 July 2022 00:25:27 +0000 (0:00:00.420) 0:00:37.655 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [add custom service that already exists] ********************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:389 Friday 22 July 2022 00:25:28 +0000 (0:00:00.776) 0:00:38.431 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [add description to custom service] *************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:397 Friday 22 July 2022 00:25:29 +0000 (0:00:00.522) 0:00:38.954 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [add short description to custom service] ********************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:406 Friday 22 July 2022 00:25:29 +0000 (0:00:00.805) 0:00:39.759 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [add source_ports to custom service] ************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:415 Friday 22 July 2022 00:25:30 +0000 (0:00:00.764) 0:00:40.524 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [add source_ports to custom service again] ******************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:424 Friday 22 July 2022 00:25:31 +0000 (0:00:00.776) 0:00:41.301 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [add invalid protocol to custom service] ********************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:433 Friday 22 July 2022 00:25:32 +0000 (0:00:00.545) 0:00:41.846 *********** ok: [/cache/rhel-7.qcow2] => { "changed": false, "failed_when_result": false } MSG: INVALID_PROTOCOL: nonexistentprotocol TASK [add valid protocol to custom service] ************************************ task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:442 Friday 22 July 2022 00:25:32 +0000 (0:00:00.553) 0:00:42.400 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [remove valid protocol from customservice] ******************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:451 Friday 22 July 2022 00:25:33 +0000 (0:00:00.759) 0:00:43.159 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [remove ports from custom service without deleting service] *************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:460 Friday 22 July 2022 00:25:34 +0000 (0:00:00.812) 0:00:43.972 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [add destination addresses] *********************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:469 Friday 22 July 2022 00:25:34 +0000 (0:00:00.760) 0:00:44.732 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [delete custom service] *************************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:480 Friday 22 July 2022 00:25:35 +0000 (0:00:00.806) 0:00:45.539 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [delete custom service again] ********************************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:488 Friday 22 July 2022 00:25:36 +0000 (0:00:00.825) 0:00:46.365 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [add custom service with all the elements at once] ************************ task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:496 Friday 22 July 2022 00:25:37 +0000 (0:00:00.518) 0:00:46.883 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [add helper module that already is on customservice] ********************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:513 Friday 22 July 2022 00:25:37 +0000 (0:00:00.812) 0:00:47.696 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [forward port 40 to 0.0.0.0:8080 (string)] ******************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:522 Friday 22 July 2022 00:25:38 +0000 (0:00:00.559) 0:00:48.255 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [forward same port again (string)] **************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:529 Friday 22 July 2022 00:25:38 +0000 (0:00:00.542) 0:00:48.798 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [disable forward port (string)] ******************************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:536 Friday 22 July 2022 00:25:39 +0000 (0:00:00.522) 0:00:49.321 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [forward port (dict form)] ************************************************ task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:543 Friday 22 July 2022 00:25:40 +0000 (0:00:00.537) 0:00:49.858 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [forward port again (dict form)] ****************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:554 Friday 22 July 2022 00:25:40 +0000 (0:00:00.527) 0:00:50.386 *********** ok: [/cache/rhel-7.qcow2] => { "__firewall_changed": false, "changed": false, "failed_when_result": false } TASK [disable forward port (dict form)] **************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:565 Friday 22 July 2022 00:25:41 +0000 (0:00:00.533) 0:00:50.919 *********** changed: [/cache/rhel-7.qcow2] => { "__firewall_changed": true, "changed": true, "failed_when_result": false } TASK [Remove custom zone] ****************************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:584 Friday 22 July 2022 00:25:41 +0000 (0:00:00.514) 0:00:51.434 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--delete-zone=custom" ], "delta": "0:00:00.286497", "end": "2022-07-21 20:25:41.885431", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:25:41.598934" } STDOUT: success TASK [Remove customzone zone] ************************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:589 Friday 22 July 2022 00:25:42 +0000 (0:00:00.590) 0:00:52.025 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--delete-zone=customzone" ], "delta": "0:00:00.268564", "end": "2022-07-21 20:25:42.460458", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:25:42.191894" } STDOUT: success TASK [Reset internal zone to defaults] ***************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:594 Friday 22 July 2022 00:25:42 +0000 (0:00:00.572) 0:00:52.597 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=internal" ], "delta": "0:00:00.290811", "end": "2022-07-21 20:25:43.059212", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:25:42.768401" } STDOUT: success TASK [Reset trusted zone to defaults] ****************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:599 Friday 22 July 2022 00:25:43 +0000 (0:00:00.599) 0:00:53.196 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=trusted" ], "delta": "0:00:00.273213", "end": "2022-07-21 20:25:43.656756", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:25:43.383543" } STDOUT: success TASK [Reset dmz zone to defaults] ********************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:604 Friday 22 July 2022 00:25:43 +0000 (0:00:00.598) 0:00:53.795 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=dmz" ], "delta": "0:00:00.269878", "end": "2022-07-21 20:25:44.235555", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:25:43.965677" } STDOUT: success TASK [Reset drop zone to defaults] ********************************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:609 Friday 22 July 2022 00:25:44 +0000 (0:00:00.578) 0:00:54.374 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=drop" ], "delta": "0:00:00.271778", "end": "2022-07-21 20:25:44.813603", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:25:44.541825" } STDOUT: success TASK [Reset public zone to defaults] ******************************************* task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:614 Friday 22 July 2022 00:25:45 +0000 (0:00:00.576) 0:00:54.950 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=public" ], "delta": "0:00:00.293306", "end": "2022-07-21 20:25:45.412835", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:25:45.119529" } STDOUT: success TASK [Reset default zone to defaults] ****************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:619 Friday 22 July 2022 00:25:45 +0000 (0:00:00.600) 0:00:55.551 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--permanent", "--load-zone-defaults=public" ], "delta": "0:00:00.274569", "end": "2022-07-21 20:25:45.993636", "failed_when_result": false, "rc": 22, "start": "2022-07-21 20:25:45.719067" } STDERR: Error: NO_DEFAULTS: public MSG: non-zero return code TASK [Reload firewalld] ******************************************************** task path: /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:624 Friday 22 July 2022 00:25:46 +0000 (0:00:00.579) 0:00:56.130 *********** changed: [/cache/rhel-7.qcow2] => { "changed": true, "cmd": [ "firewall-cmd", "--reload" ], "delta": "0:00:00.453884", "end": "2022-07-21 20:25:46.755649", "failed_when_result": false, "rc": 0, "start": "2022-07-21 20:25:46.301765" } STDOUT: success META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* /cache/rhel-7.qcow2 : ok=85 changed=53 unreachable=0 failed=0 skipped=6 rescued=0 ignored=0 Friday 22 July 2022 00:25:47 +0000 (0:00:00.767) 0:00:56.898 *********** =============================================================================== fedora.linux_system_roles.firewall : Install firewalld ------------------ 5.22s /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:7 Remove custom zone ------------------------------------------------------ 2.38s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:14 -------------------------- set up internal repositories -------------------------------------------- 1.41s /cache/rhel-7_setup.yml:5 ----------------------------------------------------- Gathering Facts --------------------------------------------------------- 0.96s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:1 --------------------------- fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.89s /tmp/tmp6awxn9b3/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:3 Reset default zone to defaults ------------------------------------------ 0.84s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:44 -------------------------- delete custom service --------------------------------------------------- 0.83s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:480 ------------------------- remove valid protocol from customservice -------------------------------- 0.81s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:451 ------------------------- add custom service with all the elements at once ------------------------ 0.81s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:496 ------------------------- add destination addresses ----------------------------------------------- 0.81s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:469 ------------------------- add description to custom service --------------------------------------- 0.81s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:397 ------------------------- Reload firewalld -------------------------------------------------------- 0.79s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:57 -------------------------- add source_ports to custom service -------------------------------------- 0.78s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:415 ------------------------- add custom service without details -------------------------------------- 0.78s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:381 ------------------------- Reload firewalld -------------------------------------------------------- 0.77s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:624 ------------------------- add short description to custom service --------------------------------- 0.76s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:406 ------------------------- remove ports from custom service without deleting service --------------- 0.76s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:460 ------------------------- add valid protocol to custom service ------------------------------------ 0.76s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:442 ------------------------- Firewalld custom zone --------------------------------------------------- 0.76s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:321 ------------------------- Ensure target ACCEPT in permanent internal zone ------------------------- 0.76s /tmp/tmp0a1kbiv1/tests/firewall/tests_ansible.yml:265 -------------------------