# STDOUT: ---v---v---v---v---v--- ansible-playbook 2.9.27 config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.9/lib/python3.9/site-packages/ansible executable location = /opt/ansible-2.9/bin/ansible-playbook python version = 3.9.18 (main, Sep 7 2023, 00:00:00) [GCC 11.4.1 20230605 (Red Hat 11.4.1-2)] Using /etc/ansible/ansible.cfg as config file Skipping callback 'actionable', as we already have a stdout callback. Skipping callback 'counter_enabled', as we already have a stdout callback. Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'full_skip', as we already have a stdout callback. Skipping callback 'json', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'null', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. Skipping callback 'selective', as we already have a stdout callback. Skipping callback 'skippy', as we already have a stdout callback. Skipping callback 'stderr', as we already have a stdout callback. Skipping callback 'unixy', as we already have a stdout callback. Skipping callback 'yaml', as we already have a stdout callback. PLAYBOOK: tests_subnet_to_subnet.yml ******************************************* 1 plays in /WORKDIR/git-weekly-ciglc7xoih/tests/tests_subnet_to_subnet.yml PLAY [Test subnet to subnet tunnels] ******************************************* TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tests_subnet_to_subnet.yml:3 Sunday 12 May 2024 04:40:53 +0000 (0:00:00.012) 0:00:00.012 ************ ok: [sut] META: ran handlers TASK [Set up test environment] ************************************************* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tests_subnet_to_subnet.yml:17 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.558) 0:00:00.570 ************ included: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/setup_test.yml for sut TASK [Set platform/version specific variables] ********************************* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/setup_test.yml:2 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.013) 0:00:00.584 ************ TASK [linux-system-roles.vpn : Ensure ansible_facts used by role] ************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:2 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.027) 0:00:00.611 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Check if system is ostree] ********************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:11 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.018) 0:00:00.630 ************ ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [linux-system-roles.vpn : Set flag to indicate system is ostree] ********** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:16 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.193) 0:00:00.824 ************ ok: [sut] => { "ansible_facts": { "__vpn_is_ostree": false }, "changed": false } TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:20 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.021) 0:00:00.845 ************ skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=CentOS_7.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/vars/CentOS_7.yml" ], "ansible_loop_var": "item", "changed": false, "item": "CentOS_7.yml" } skipping: [sut] => (item=CentOS_7.9.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_7.9.yml", "skip_reason": "Conditional result was False" } TASK [Change inventory_hostname] *********************************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/setup_test.yml:11 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.033) 0:00:00.878 ************ ok: [sut] => { "ansible_facts": { "inventory_hostname": "mainhost.local" }, "changed": false } TASK [Add sample main host] **************************************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/setup_test.yml:18 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.021) 0:00:00.900 ************ creating host via 'add_host': hostname=mainhost.local changed: [sut] => { "add_host": { "groups": [], "host_name": "mainhost.local", "host_vars": {} }, "changed": true } TASK [Create nss directory for testing] **************************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/setup_test.yml:22 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.019) 0:00:00.920 ************ changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 4096, "state": "directory", "uid": 0 } TASK [Create /etc/ipsec.d directory for testing] ******************************* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/setup_test.yml:28 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.216) 0:00:01.137 ************ ok: [sut] => { "changed": false, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 4096, "state": "directory", "uid": 0 } TASK [Dynamically add more hosts] ********************************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/setup_test.yml:34 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.127) 0:00:01.264 ************ included: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/add_hosts.yml for sut TASK [Dynamically add multiple hosts for testing] ****************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/add_hosts.yml:2 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.010) 0:00:01.274 ************ creating host via 'add_host': hostname=host01.local changed: [sut] => (item=1) => { "add_host": { "groups": [ "testing" ], "host_name": "host01.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 1 } TASK [Create mock vpn_connections] ********************************************* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/add_hosts.yml:11 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.021) 0:00:01.296 ************ ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "hosts": { "host01.local": "", "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [Create sample policies directory for testing] **************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/setup_test.yml:40 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.019) 0:00:01.315 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/setup_test.yml:46 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.017) 0:00:01.332 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/setup_test.yml:52 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.018) 0:00:01.351 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/setup_test.yml:58 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.017) 0:00:01.369 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Ensure firewalld not running if not testing firewall] ******************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/setup_test.yml:67 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.018) 0:00:01.387 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Add subnets] ************************************************************* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tests_subnet_to_subnet.yml:20 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.017) 0:00:01.405 ************ ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "hosts": { "host01.local": { "subnets": [ "192.0.2.0/24", "198.51.100.0/24", "203.0.113.0/24" ] }, "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [Use vpn role] ************************************************************ task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tests_subnet_to_subnet.yml:29 Sunday 12 May 2024 04:40:54 +0000 (0:00:00.019) 0:00:01.424 ************ TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:3 Sunday 12 May 2024 04:40:55 +0000 (0:00:00.024) 0:00:01.448 ************ included: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml for sut TASK [linux-system-roles.vpn : Ensure ansible_facts used by role] ************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:2 Sunday 12 May 2024 04:40:55 +0000 (0:00:00.013) 0:00:01.462 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Check if system is ostree] ********************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:11 Sunday 12 May 2024 04:40:55 +0000 (0:00:00.018) 0:00:01.481 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Set flag to indicate system is ostree] ********** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:16 Sunday 12 May 2024 04:40:55 +0000 (0:00:00.023) 0:00:01.504 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:20 Sunday 12 May 2024 04:40:55 +0000 (0:00:00.023) 0:00:01.528 ************ skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=CentOS_7.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/vars/CentOS_7.yml" ], "ansible_loop_var": "item", "changed": false, "item": "CentOS_7.yml" } skipping: [sut] => (item=CentOS_7.9.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_7.9.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Ensure required packages are installed] ********* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:6 Sunday 12 May 2024 04:40:55 +0000 (0:00:00.036) 0:00:01.564 ************ ok: [sut] => { "changed": false, "rc": 0, "results": [ "iproute-4.11.0-30.el7.x86_64 providing iproute is already installed", "libreswan-3.25-9.1.el7_8.x86_64 providing libreswan is already installed" ] } lsrpackages: iproute libreswan TASK [linux-system-roles.vpn : Configure firewall] ***************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:14 Sunday 12 May 2024 04:40:55 +0000 (0:00:00.454) 0:00:02.018 ************ included: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/firewall.yml for sut TASK [Ensure the vpn ports status with the firewall role] ********************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/firewall.yml:3 Sunday 12 May 2024 04:40:55 +0000 (0:00:00.011) 0:00:02.030 ************ TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Sunday 12 May 2024 04:40:55 +0000 (0:00:00.034) 0:00:02.064 ************ included: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Sunday 12 May 2024 04:40:55 +0000 (0:00:00.015) 0:00:02.080 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:10 Sunday 12 May 2024 04:40:55 +0000 (0:00:00.018) 0:00:02.098 ************ ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [fedora.linux_system_roles.firewall : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:15 Sunday 12 May 2024 04:40:55 +0000 (0:00:00.178) 0:00:02.277 ************ ok: [sut] => { "ansible_facts": { "__firewall_is_ostree": false }, "changed": false } TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:19 Sunday 12 May 2024 04:40:55 +0000 (0:00:00.021) 0:00:02.298 ************ ok: [sut] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [fedora.linux_system_roles.firewall : Collect service facts] ************** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Sunday 12 May 2024 04:40:56 +0000 (0:00:00.369) 0:00:02.668 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Sunday 12 May 2024 04:40:56 +0000 (0:00:00.020) 0:00:02.688 ************ skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "item": "ufw", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Unmask firewalld service] *********** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:22 Sunday 12 May 2024 04:40:56 +0000 (0:00:00.031) 0:00:02.720 ************ ok: [sut] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "basic.target system.slice polkit.service dbus.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "network-pre.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "ipset.service shutdown.target iptables.service ebtables.service ip6tables.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "Wants": "network-pre.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Sunday 12 May 2024 04:40:56 +0000 (0:00:00.332) 0:00:03.053 ************ changed: [sut] => { "changed": true, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "basic.target system.slice polkit.service dbus.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "network-pre.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "ebtables.service iptables.service ip6tables.service ipset.service shutdown.target", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "Wants": "network-pre.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:34 Sunday 12 May 2024 04:40:57 +0000 (0:00:00.795) 0:00:03.848 ************ ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python", "__firewall_report_changed": true }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:43 Sunday 12 May 2024 04:40:57 +0000 (0:00:00.029) 0:00:03.877 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:55 Sunday 12 May 2024 04:40:57 +0000 (0:00:00.020) 0:00:03.898 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 Sunday 12 May 2024 04:40:57 +0000 (0:00:00.023) 0:00:03.921 ************ changed: [sut] => (item={'service': 'ipsec', 'state': 'enabled'}) => { "__firewall_changed": true, "ansible_loop_var": "item", "changed": true, "item": { "service": "ipsec", "state": "enabled" } } TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:120 Sunday 12 May 2024 04:40:58 +0000 (0:00:01.010) 0:00:04.932 ************ skipping: [sut] => (item={'service': 'ipsec', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "service": "ipsec", "state": "enabled" }, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:130 Sunday 12 May 2024 04:40:58 +0000 (0:00:00.026) 0:00:04.958 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:139 Sunday 12 May 2024 04:40:58 +0000 (0:00:00.020) 0:00:04.979 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:144 Sunday 12 May 2024 04:40:58 +0000 (0:00:00.017) 0:00:04.997 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:153 Sunday 12 May 2024 04:40:58 +0000 (0:00:00.017) 0:00:05.015 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:163 Sunday 12 May 2024 04:40:58 +0000 (0:00:00.019) 0:00:05.034 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:169 Sunday 12 May 2024 04:40:58 +0000 (0:00:00.017) 0:00:05.052 ************ skipping: [sut] => {} TASK [linux-system-roles.vpn : Configure selinux] ****************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:17 Sunday 12 May 2024 04:40:58 +0000 (0:00:00.021) 0:00:05.073 ************ included: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/selinux.yml for sut TASK [linux-system-roles.vpn : Populate service facts] ************************* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:3 Sunday 12 May 2024 04:40:58 +0000 (0:00:00.013) 0:00:05.087 ************ ok: [sut] => { "ansible_facts": { "services": { "NetworkManager-dispatcher.service": { "name": "NetworkManager-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "NetworkManager-wait-online.service": { "name": "NetworkManager-wait-online.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "NetworkManager.service": { "name": "NetworkManager.service", "source": "systemd", "state": "running", "status": "enabled" }, "arp-ethers.service": { "name": "arp-ethers.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "auditd.service": { "name": "auditd.service", "source": "systemd", "state": "running", "status": "enabled" }, "auth-rpcgss-module.service": { "name": "auth-rpcgss-module.service", "source": "systemd", "state": "stopped", "status": "static" }, "autovt@.service": { "name": "autovt@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "blk-availability.service": { "name": "blk-availability.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "brandbot.service": { "name": "brandbot.service", "source": "systemd", "state": "inactive", "status": "static" }, "chrony-dnssrv@.service": { "name": "chrony-dnssrv@.service", "source": "systemd", "state": "unknown", "status": "static" }, "chrony-wait.service": { "name": "chrony-wait.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "chronyd.service": { "name": "chronyd.service", "source": "systemd", "state": "running", "status": "enabled" }, "cloud-config.service": { "name": "cloud-config.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-final.service": { "name": "cloud-final.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init-local.service": { "name": "cloud-init-local.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init.service": { "name": "cloud-init.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "console-getty.service": { "name": "console-getty.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "console-shell.service": { "name": "console-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "container-getty@.service": { "name": "container-getty@.service", "source": "systemd", "state": "unknown", "status": "static" }, "cpupower.service": { "name": "cpupower.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "crond.service": { "name": "crond.service", "source": "systemd", "state": "running", "status": "enabled" }, "dbus-org.fedoraproject.FirewallD1.service": { "name": "dbus-org.fedoraproject.FirewallD1.service", "source": "systemd", "state": "active", "status": "enabled" }, "dbus-org.freedesktop.hostname1.service": { "name": "dbus-org.freedesktop.hostname1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.import1.service": { "name": "dbus-org.freedesktop.import1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.locale1.service": { "name": "dbus-org.freedesktop.locale1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.login1.service": { "name": "dbus-org.freedesktop.login1.service", "source": "systemd", "state": "active", "status": "static" }, "dbus-org.freedesktop.machine1.service": { "name": "dbus-org.freedesktop.machine1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.nm-dispatcher.service": { "name": "dbus-org.freedesktop.nm-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus-org.freedesktop.timedate1.service": { "name": "dbus-org.freedesktop.timedate1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus.service": { "name": "dbus.service", "source": "systemd", "state": "running", "status": "static" }, "debug-shell.service": { "name": "debug-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "dracut-cmdline.service": { "name": "dracut-cmdline.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-initqueue.service": { "name": "dracut-initqueue.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-mount.service": { "name": "dracut-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-mount.service": { "name": "dracut-pre-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-pivot.service": { "name": "dracut-pre-pivot.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-trigger.service": { "name": "dracut-pre-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-udev.service": { "name": "dracut-pre-udev.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown.service": { "name": "dracut-shutdown.service", "source": "systemd", "state": "stopped", "status": "static" }, "ebtables.service": { "name": "ebtables.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "emergency.service": { "name": "emergency.service", "source": "systemd", "state": "stopped", "status": "static" }, "firewalld.service": { "name": "firewalld.service", "source": "systemd", "state": "running", "status": "enabled" }, "fstrim.service": { "name": "fstrim.service", "source": "systemd", "state": "inactive", "status": "static" }, "getty@.service": { "name": "getty@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "getty@tty1.service": { "name": "getty@tty1.service", "source": "systemd", "state": "running", "status": "unknown" }, "gssproxy.service": { "name": "gssproxy.service", "source": "systemd", "state": "running", "status": "disabled" }, "halt-local.service": { "name": "halt-local.service", "source": "systemd", "state": "inactive", "status": "static" }, "initrd-cleanup.service": { "name": "initrd-cleanup.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-parse-etc.service": { "name": "initrd-parse-etc.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-switch-root.service": { "name": "initrd-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-udevadm-cleanup-db.service": { "name": "initrd-udevadm-cleanup-db.service", "source": "systemd", "state": "stopped", "status": "static" }, "iprdump.service": { "name": "iprdump.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprinit.service": { "name": "iprinit.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprupdate.service": { "name": "iprupdate.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ipsec.service": { "name": "ipsec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "irqbalance.service": { "name": "irqbalance.service", "source": "systemd", "state": "running", "status": "enabled" }, "kdump.service": { "name": "kdump.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "kmod-static-nodes.service": { "name": "kmod-static-nodes.service", "source": "systemd", "state": "stopped", "status": "static" }, "messagebus.service": { "name": "messagebus.service", "source": "systemd", "state": "active", "status": "static" }, "microcode.service": { "name": "microcode.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "netconsole": { "name": "netconsole", "source": "sysv", "state": "stopped", "status": "disabled" }, "network": { "name": "network", "source": "sysv", "state": "running", "status": "enabled" }, "network.service": { "name": "network.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "nfs-blkmap.service": { "name": "nfs-blkmap.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-config.service": { "name": "nfs-config.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-idmap.service": { "name": "nfs-idmap.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-idmapd.service": { "name": "nfs-idmapd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-lock.service": { "name": "nfs-lock.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-mountd.service": { "name": "nfs-mountd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-rquotad.service": { "name": "nfs-rquotad.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-secure.service": { "name": "nfs-secure.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-server.service": { "name": "nfs-server.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nfs-utils.service": { "name": "nfs-utils.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs.service": { "name": "nfs.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfslock.service": { "name": "nfslock.service", "source": "systemd", "state": "inactive", "status": "static" }, "ntpdate.service": { "name": "ntpdate.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-halt.service": { "name": "plymouth-halt.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-kexec.service": { "name": "plymouth-kexec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-poweroff.service": { "name": "plymouth-poweroff.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-quit-wait.service": { "name": "plymouth-quit-wait.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-quit.service": { "name": "plymouth-quit.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-read-write.service": { "name": "plymouth-read-write.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-reboot.service": { "name": "plymouth-reboot.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-start.service": { "name": "plymouth-start.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-switch-root.service": { "name": "plymouth-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "polkit.service": { "name": "polkit.service", "source": "systemd", "state": "running", "status": "static" }, "postfix.service": { "name": "postfix.service", "source": "systemd", "state": "running", "status": "enabled" }, "qemu-guest-agent.service": { "name": "qemu-guest-agent.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "quotaon.service": { "name": "quotaon.service", "source": "systemd", "state": "inactive", "status": "static" }, "rc-local.service": { "name": "rc-local.service", "source": "systemd", "state": "stopped", "status": "static" }, "rdisc.service": { "name": "rdisc.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rescue.service": { "name": "rescue.service", "source": "systemd", "state": "stopped", "status": "static" }, "restraintd.service": { "name": "restraintd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rhel-autorelabel-mark.service": { "name": "rhel-autorelabel-mark.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-autorelabel.service": { "name": "rhel-autorelabel.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-configure.service": { "name": "rhel-configure.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-dmesg.service": { "name": "rhel-dmesg.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-domainname.service": { "name": "rhel-domainname.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-import-state.service": { "name": "rhel-import-state.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-loadmodules.service": { "name": "rhel-loadmodules.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-readonly.service": { "name": "rhel-readonly.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rngd.service": { "name": "rngd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpc-gssd.service": { "name": "rpc-gssd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-rquotad.service": { "name": "rpc-rquotad.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rpc-statd-notify.service": { "name": "rpc-statd-notify.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd.service": { "name": "rpc-statd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpcbind.service": { "name": "rpcbind.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpcgssd.service": { "name": "rpcgssd.service", "source": "systemd", "state": "inactive", "status": "static" }, "rpcidmapd.service": { "name": "rpcidmapd.service", "source": "systemd", "state": "inactive", "status": "static" }, "rsyncd.service": { "name": "rsyncd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rsyncd@.service": { "name": "rsyncd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "rsyslog.service": { "name": "rsyslog.service", "source": "systemd", "state": "running", "status": "enabled" }, "selinux-policy-migrate-local-changes@.service": { "name": "selinux-policy-migrate-local-changes@.service", "source": "systemd", "state": "unknown", "status": "static" }, "selinux-policy-migrate-local-changes@targeted.service": { "name": "selinux-policy-migrate-local-changes@targeted.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "serial-getty@.service": { "name": "serial-getty@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "sshd-keygen.service": { "name": "sshd-keygen.service", "source": "systemd", "state": "stopped", "status": "static" }, "sshd.service": { "name": "sshd.service", "source": "systemd", "state": "running", "status": "enabled" }, "sshd@.service": { "name": "sshd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-ask-password-console.service": { "name": "systemd-ask-password-console.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-plymouth.service": { "name": "systemd-ask-password-plymouth.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-wall.service": { "name": "systemd-ask-password-wall.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-backlight@.service": { "name": "systemd-backlight@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-binfmt.service": { "name": "systemd-binfmt.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-bootchart.service": { "name": "systemd-bootchart.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-firstboot.service": { "name": "systemd-firstboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck-root.service": { "name": "systemd-fsck-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck@.service": { "name": "systemd-fsck@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-halt.service": { "name": "systemd-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hibernate-resume@.service": { "name": "systemd-hibernate-resume@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-hibernate.service": { "name": "systemd-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hostnamed.service": { "name": "systemd-hostnamed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hwdb-update.service": { "name": "systemd-hwdb-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-hybrid-sleep.service": { "name": "systemd-hybrid-sleep.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-importd.service": { "name": "systemd-importd.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-initctl.service": { "name": "systemd-initctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-catalog-update.service": { "name": "systemd-journal-catalog-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-flush.service": { "name": "systemd-journal-flush.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journald.service": { "name": "systemd-journald.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-kexec.service": { "name": "systemd-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-localed.service": { "name": "systemd-localed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-logind.service": { "name": "systemd-logind.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-machine-id-commit.service": { "name": "systemd-machine-id-commit.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-machined.service": { "name": "systemd-machined.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-modules-load.service": { "name": "systemd-modules-load.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-nspawn@.service": { "name": "systemd-nspawn@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "systemd-poweroff.service": { "name": "systemd-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-quotacheck.service": { "name": "systemd-quotacheck.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-random-seed.service": { "name": "systemd-random-seed.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-readahead-collect.service": { "name": "systemd-readahead-collect.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-readahead-done.service": { "name": "systemd-readahead-done.service", "source": "systemd", "state": "stopped", "status": "indirect" }, "systemd-readahead-drop.service": { "name": "systemd-readahead-drop.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "systemd-readahead-replay.service": { "name": "systemd-readahead-replay.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-reboot.service": { "name": "systemd-reboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-remount-fs.service": { "name": "systemd-remount-fs.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-rfkill@.service": { "name": "systemd-rfkill@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-shutdownd.service": { "name": "systemd-shutdownd.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-suspend.service": { "name": "systemd-suspend.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-sysctl.service": { "name": "systemd-sysctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-timedated.service": { "name": "systemd-timedated.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-tmpfiles-clean.service": { "name": "systemd-tmpfiles-clean.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup-dev.service": { "name": "systemd-tmpfiles-setup-dev.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup.service": { "name": "systemd-tmpfiles-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-settle.service": { "name": "systemd-udev-settle.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-udev-trigger.service": { "name": "systemd-udev-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udevd.service": { "name": "systemd-udevd.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-update-done.service": { "name": "systemd-update-done.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp-runlevel.service": { "name": "systemd-update-utmp-runlevel.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp.service": { "name": "systemd-update-utmp.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-user-sessions.service": { "name": "systemd-user-sessions.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-vconsole-setup.service": { "name": "systemd-vconsole-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "teamd@.service": { "name": "teamd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "tuned.service": { "name": "tuned.service", "source": "systemd", "state": "running", "status": "enabled" }, "unbound-anchor.service": { "name": "unbound-anchor.service", "source": "systemd", "state": "stopped", "status": "static" }, "wpa_supplicant.service": { "name": "wpa_supplicant.service", "source": "systemd", "state": "inactive", "status": "disabled" } } }, "changed": false } TASK [linux-system-roles.vpn : Get the ipsec tcp service ports] **************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:12 Sunday 12 May 2024 04:40:59 +0000 (0:00:00.812) 0:00:05.899 ************ ok: [sut] => { "changed": false, "cmd": "set -euo pipefail\nfirewall-cmd --info-service=ipsec | egrep \"^ +ports: +\" | sed -e \"s/ *ports: //\"", "delta": "0:00:00.391303", "end": "2024-05-12 04:41:00.045405", "rc": 0, "start": "2024-05-12 04:40:59.654102" } STDOUT: 500/udp 4500/udp TASK [linux-system-roles.vpn : Initialize _vpn_selinux] ************************ task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:20 Sunday 12 May 2024 04:41:00 +0000 (0:00:00.594) 0:00:06.493 ************ ok: [sut] => { "ansible_facts": { "_vpn_selinux": [] }, "changed": false } TASK [linux-system-roles.vpn : Add the ipsec service ports to _vpn_selinux] **** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:24 Sunday 12 May 2024 04:41:00 +0000 (0:00:00.040) 0:00:06.534 ************ ok: [sut] => (item=500/udp) => { "ansible_facts": { "_vpn_selinux": [ { "local": true, "ports": "500", "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" } ] }, "ansible_loop_var": "item", "changed": false, "item": "500/udp" } ok: [sut] => (item=4500/udp) => { "ansible_facts": { "_vpn_selinux": [ { "local": true, "ports": "500", "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" }, { "local": true, "ports": "4500", "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" } ] }, "ansible_loop_var": "item", "changed": false, "item": "4500/udp" } TASK [Ensure the service and the ports status with the selinux role] *********** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:33 Sunday 12 May 2024 04:41:00 +0000 (0:00:00.045) 0:00:06.580 ************ TASK [fedora.linux_system_roles.selinux : Set ansible_facts required by role and install packages] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:2 Sunday 12 May 2024 04:41:00 +0000 (0:00:00.045) 0:00:06.626 ************ included: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/set_facts_packages.yml for sut TASK [fedora.linux_system_roles.selinux : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/set_facts_packages.yml:2 Sunday 12 May 2024 04:41:00 +0000 (0:00:00.034) 0:00:06.661 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Ensure SELinux packages] ************* task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/set_facts_packages.yml:7 Sunday 12 May 2024 04:41:00 +0000 (0:00:00.026) 0:00:06.687 ************ included: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/ensure_selinux_packages.yml for sut TASK [fedora.linux_system_roles.selinux : Check if system is ostree] *********** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/ensure_selinux_packages.yml:5 Sunday 12 May 2024 04:41:00 +0000 (0:00:00.034) 0:00:06.721 ************ ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [fedora.linux_system_roles.selinux : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/ensure_selinux_packages.yml:10 Sunday 12 May 2024 04:41:00 +0000 (0:00:00.139) 0:00:06.860 ************ ok: [sut] => { "ansible_facts": { "__selinux_is_ostree": false }, "changed": false } TASK [fedora.linux_system_roles.selinux : Install SELinux python2 tools] ******* task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/ensure_selinux_packages.yml:14 Sunday 12 May 2024 04:41:00 +0000 (0:00:00.027) 0:00:06.888 ************ ok: [sut] => { "changed": false, "rc": 0, "results": [ "libselinux-python-2.5-15.el7.x86_64 providing libselinux-python is already installed", "policycoreutils-python-2.5-34.el7.x86_64 providing policycoreutils-python is already installed" ] } lsrpackages: libselinux-python policycoreutils-python TASK [fedora.linux_system_roles.selinux : Install SELinux python3 tools] ******* task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/ensure_selinux_packages.yml:23 Sunday 12 May 2024 04:41:00 +0000 (0:00:00.370) 0:00:07.258 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Install SELinux python3 tools] ******* task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/ensure_selinux_packages.yml:34 Sunday 12 May 2024 04:41:00 +0000 (0:00:00.025) 0:00:07.284 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Install SELinux tool semanage] ******* task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/ensure_selinux_packages.yml:45 Sunday 12 May 2024 04:41:00 +0000 (0:00:00.023) 0:00:07.307 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Refresh facts] *********************** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/ensure_selinux_packages.yml:53 Sunday 12 May 2024 04:41:00 +0000 (0:00:00.025) 0:00:07.333 ************ ok: [sut] TASK [fedora.linux_system_roles.selinux : Set permanent SELinux state if enabled] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:5 Sunday 12 May 2024 04:41:01 +0000 (0:00:00.389) 0:00:07.722 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Set permanent SELinux state if disabled] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:13 Sunday 12 May 2024 04:41:01 +0000 (0:00:00.024) 0:00:07.747 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Set selinux_reboot_required] ********* task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:21 Sunday 12 May 2024 04:41:01 +0000 (0:00:00.023) 0:00:07.771 ************ ok: [sut] => { "ansible_facts": { "selinux_reboot_required": false }, "changed": false } TASK [fedora.linux_system_roles.selinux : Fail if reboot is required] ********** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:25 Sunday 12 May 2024 04:41:01 +0000 (0:00:00.025) 0:00:07.796 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Warn if SELinux is disabled] ********* task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:30 Sunday 12 May 2024 04:41:01 +0000 (0:00:00.022) 0:00:07.819 ************ skipping: [sut] => {} TASK [fedora.linux_system_roles.selinux : Drop all local modifications] ******** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:35 Sunday 12 May 2024 04:41:01 +0000 (0:00:00.025) 0:00:07.844 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Purge all SELinux boolean local modifications] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:43 Sunday 12 May 2024 04:41:01 +0000 (0:00:00.023) 0:00:07.868 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Purge all SELinux file context local modifications] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:48 Sunday 12 May 2024 04:41:01 +0000 (0:00:00.023) 0:00:07.892 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Purge all SELinux port local modifications] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:53 Sunday 12 May 2024 04:41:01 +0000 (0:00:00.023) 0:00:07.915 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Purge all SELinux login local modifications] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:58 Sunday 12 May 2024 04:41:01 +0000 (0:00:00.025) 0:00:07.940 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Set SELinux booleans] **************** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:63 Sunday 12 May 2024 04:41:01 +0000 (0:00:00.025) 0:00:07.965 ************ TASK [fedora.linux_system_roles.selinux : Set SELinux file contexts] *********** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:74 Sunday 12 May 2024 04:41:01 +0000 (0:00:00.022) 0:00:07.988 ************ TASK [fedora.linux_system_roles.selinux : Set an SELinux label on a port] ****** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:87 Sunday 12 May 2024 04:41:01 +0000 (0:00:00.029) 0:00:08.017 ************ changed: [sut] => (item={'ports': '500', 'proto': 'udp', 'setype': 'ipsecnat_port_t', 'state': 'present', 'local': True}) => { "__selinux_item": { "local": true, "ports": "500", "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" }, "ansible_loop_var": "__selinux_item", "changed": true, "ports": [ "500" ], "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" } changed: [sut] => (item={'ports': '4500', 'proto': 'udp', 'setype': 'ipsecnat_port_t', 'state': 'present', 'local': True}) => { "__selinux_item": { "local": true, "ports": "4500", "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" }, "ansible_loop_var": "__selinux_item", "changed": true, "ports": [ "4500" ], "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" } TASK [fedora.linux_system_roles.selinux : Set linux user to SELinux user mapping] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:99 Sunday 12 May 2024 04:41:09 +0000 (0:00:08.264) 0:00:16.281 ************ TASK [fedora.linux_system_roles.selinux : Get SELinux modules facts] *********** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:112 Sunday 12 May 2024 04:41:09 +0000 (0:00:00.020) 0:00:16.301 ************ ok: [sut] => { "ansible_facts": { "selinux_checksums": false, "selinux_installed_modules": { "abrt": { "100": { "checksum": "", "enabled": 1 } }, "accountsd": { "100": { "checksum": "", "enabled": 1 } }, "acct": { "100": { "checksum": "", "enabled": 1 } }, "afs": { "100": { "checksum": "", "enabled": 1 } }, "aiccu": { "100": { "checksum": "", "enabled": 1 } }, "aide": { "100": { "checksum": "", "enabled": 1 } }, "ajaxterm": { "100": { "checksum": "", "enabled": 1 } }, "alsa": { "100": { "checksum": "", "enabled": 1 } }, "amanda": { "100": { "checksum": "", "enabled": 1 } }, "amtu": { "100": { "checksum": "", "enabled": 1 } }, "anaconda": { "100": { "checksum": "", "enabled": 1 } }, "antivirus": { "100": { "checksum": "", "enabled": 1 } }, "apache": { "100": { "checksum": "", "enabled": 1 } }, "apcupsd": { "100": { "checksum": "", "enabled": 1 } }, "apm": { "100": { "checksum": "", "enabled": 1 } }, "application": { "100": { "checksum": "", "enabled": 1 } }, "arpwatch": { "100": { "checksum": "", "enabled": 1 } }, "asterisk": { "100": { "checksum": "", "enabled": 1 } }, "auditadm": { "100": { "checksum": "", "enabled": 1 } }, "authconfig": { "100": { "checksum": "", "enabled": 1 } }, "authlogin": { "100": { "checksum": "", "enabled": 1 } }, "automount": { "100": { "checksum": "", "enabled": 1 } }, "avahi": { "100": { "checksum": "", "enabled": 1 } }, "awstats": { "100": { "checksum": "", "enabled": 1 } }, "bacula": { "100": { "checksum": "", "enabled": 1 } }, "base": { "100": { "checksum": "", "enabled": 1 } }, "bcfg2": { "100": { "checksum": "", "enabled": 1 } }, "bind": { "100": { "checksum": "", "enabled": 1 } }, "bitlbee": { "100": { "checksum": "", "enabled": 1 } }, "blkmapd": { "100": { "checksum": "", "enabled": 1 } }, "blueman": { "100": { "checksum": "", "enabled": 1 } }, "bluetooth": { "100": { "checksum": "", "enabled": 1 } }, "boinc": { "100": { "checksum": "", "enabled": 1 } }, "boltd": { "100": { "checksum": "", "enabled": 1 } }, "bootloader": { "100": { "checksum": "", "enabled": 1 } }, "brctl": { "100": { "checksum": "", "enabled": 1 } }, "brltty": { "100": { "checksum": "", "enabled": 1 } }, "bugzilla": { "100": { "checksum": "", "enabled": 1 } }, "bumblebee": { "100": { "checksum": "", "enabled": 1 } }, "cachefilesd": { "100": { "checksum": "", "enabled": 1 } }, "calamaris": { "100": { "checksum": "", "enabled": 1 } }, "callweaver": { "100": { "checksum": "", "enabled": 1 } }, "canna": { "100": { "checksum": "", "enabled": 1 } }, "ccs": { "100": { "checksum": "", "enabled": 1 } }, "cdrecord": { "100": { "checksum": "", "enabled": 1 } }, "certmaster": { "100": { "checksum": "", "enabled": 1 } }, "certmonger": { "100": { "checksum": "", "enabled": 1 } }, "certwatch": { "100": { "checksum": "", "enabled": 1 } }, "cfengine": { "100": { "checksum": "", "enabled": 1 } }, "cgdcbxd": { "100": { "checksum": "", "enabled": 1 } }, "cgroup": { "100": { "checksum": "", "enabled": 1 } }, "chrome": { "100": { "checksum": "", "enabled": 1 } }, "chronyd": { "100": { "checksum": "", "enabled": 1 } }, "cinder": { "100": { "checksum": "", "enabled": 1 } }, "cipe": { "100": { "checksum": "", "enabled": 1 } }, "clock": { "100": { "checksum": "", "enabled": 1 } }, "clogd": { "100": { "checksum": "", "enabled": 1 } }, "cloudform": { "100": { "checksum": "", "enabled": 1 } }, "cmirrord": { "100": { "checksum": "", "enabled": 1 } }, "cobbler": { "100": { "checksum": "", "enabled": 1 } }, "cockpit": { "100": { "checksum": "", "enabled": 1 } }, "collectd": { "100": { "checksum": "", "enabled": 1 } }, "colord": { "100": { "checksum": "", "enabled": 1 } }, "comsat": { "100": { "checksum": "", "enabled": 1 } }, "condor": { "100": { "checksum": "", "enabled": 1 } }, "conman": { "100": { "checksum": "", "enabled": 1 } }, "consolekit": { "100": { "checksum": "", "enabled": 1 } }, "container": { "100": { "checksum": "", "enabled": 1 } }, "couchdb": { "100": { "checksum": "", "enabled": 1 } }, "courier": { "100": { "checksum": "", "enabled": 1 } }, "cpucontrol": { "100": { "checksum": "", "enabled": 1 } }, "cpufreqselector": { "100": { "checksum": "", "enabled": 1 } }, "cpuplug": { "100": { "checksum": "", "enabled": 1 } }, "cron": { "100": { "checksum": "", "enabled": 1 } }, "ctdb": { "100": { "checksum": "", "enabled": 1 } }, "cups": { "100": { "checksum": "", "enabled": 1 } }, "cvs": { "100": { "checksum": "", "enabled": 1 } }, "cyphesis": { "100": { "checksum": "", "enabled": 1 } }, "cyrus": { "100": { "checksum": "", "enabled": 1 } }, "daemontools": { "100": { "checksum": "", "enabled": 1 } }, "dbadm": { "100": { "checksum": "", "enabled": 1 } }, "dbskk": { "100": { "checksum": "", "enabled": 1 } }, "dbus": { "100": { "checksum": "", "enabled": 1 } }, "dcc": { "100": { "checksum": "", "enabled": 1 } }, "ddclient": { "100": { "checksum": "", "enabled": 1 } }, "denyhosts": { "100": { "checksum": "", "enabled": 1 } }, "devicekit": { "100": { "checksum": "", "enabled": 1 } }, "dhcp": { "100": { "checksum": "", "enabled": 1 } }, "dictd": { "100": { "checksum": "", "enabled": 1 } }, "dirsrv": { "100": { "checksum": "", "enabled": 1 } }, "dirsrv-admin": { "100": { "checksum": "", "enabled": 1 } }, "dmesg": { "100": { "checksum": "", "enabled": 1 } }, "dmidecode": { "100": { "checksum": "", "enabled": 1 } }, "dnsmasq": { "100": { "checksum": "", "enabled": 1 } }, "dnssec": { "100": { "checksum": "", "enabled": 1 } }, "dovecot": { "100": { "checksum": "", "enabled": 1 } }, "drbd": { "100": { "checksum": "", "enabled": 1 } }, "dspam": { "100": { "checksum": "", "enabled": 1 } }, "entropyd": { "100": { "checksum": "", "enabled": 1 } }, "exim": { "100": { "checksum": "", "enabled": 1 } }, "fail2ban": { "100": { "checksum": "", "enabled": 1 } }, "fcoe": { "100": { "checksum": "", "enabled": 1 } }, "fetchmail": { "100": { "checksum": "", "enabled": 1 } }, "finger": { "100": { "checksum": "", "enabled": 1 } }, "firewalld": { "100": { "checksum": "", "enabled": 1 } }, "firewallgui": { "100": { "checksum": "", "enabled": 1 } }, "firstboot": { "100": { "checksum": "", "enabled": 1 } }, "fprintd": { "100": { "checksum": "", "enabled": 1 } }, "freeipmi": { "100": { "checksum": "", "enabled": 1 } }, "freqset": { "100": { "checksum": "", "enabled": 1 } }, "fstools": { "100": { "checksum": "", "enabled": 1 } }, "ftp": { "100": { "checksum": "", "enabled": 1 } }, "games": { "100": { "checksum": "", "enabled": 1 } }, "ganesha": { "100": { "checksum": "", "enabled": 1 } }, "gdomap": { "100": { "checksum": "", "enabled": 1 } }, "geoclue": { "100": { "checksum": "", "enabled": 1 } }, "getty": { "100": { "checksum": "", "enabled": 1 } }, "git": { "100": { "checksum": "", "enabled": 1 } }, "gitosis": { "100": { "checksum": "", "enabled": 1 } }, "glance": { "100": { "checksum": "", "enabled": 1 } }, "glusterd": { "100": { "checksum": "", "enabled": 1 } }, "gnome": { "100": { "checksum": "", "enabled": 1 } }, "gpg": { "100": { "checksum": "", "enabled": 1 } }, "gpm": { "100": { "checksum": "", "enabled": 1 } }, "gpsd": { "100": { "checksum": "", "enabled": 1 } }, "gssproxy": { "100": { "checksum": "", "enabled": 1 } }, "guest": { "100": { "checksum": "", "enabled": 1 } }, "hddtemp": { "100": { "checksum": "", "enabled": 1 } }, "hostname": { "100": { "checksum": "", "enabled": 1 } }, "hsqldb": { "100": { "checksum": "", "enabled": 1 } }, "hwloc": { "100": { "checksum": "", "enabled": 1 } }, "hypervkvp": { "100": { "checksum": "", "enabled": 1 } }, "icecast": { "100": { "checksum": "", "enabled": 1 } }, "inetd": { "100": { "checksum": "", "enabled": 1 } }, "init": { "100": { "checksum": "", "enabled": 1 } }, "inn": { "100": { "checksum": "", "enabled": 1 } }, "iodine": { "100": { "checksum": "", "enabled": 1 } }, "iotop": { "100": { "checksum": "", "enabled": 1 } }, "ipa": { "100": { "checksum": "", "enabled": 1 } }, "ipmievd": { "100": { "checksum": "", "enabled": 1 } }, "ipsec": { "100": { "checksum": "", "enabled": 1 } }, "iptables": { "100": { "checksum": "", "enabled": 1 } }, "irc": { "100": { "checksum": "", "enabled": 1 } }, "irqbalance": { "100": { "checksum": "", "enabled": 1 } }, "iscsi": { "100": { "checksum": "", "enabled": 1 } }, "isns": { "100": { "checksum": "", "enabled": 1 } }, "jabber": { "100": { "checksum": "", "enabled": 1 } }, "jetty": { "100": { "checksum": "", "enabled": 1 } }, "jockey": { "100": { "checksum": "", "enabled": 1 } }, "journalctl": { "100": { "checksum": "", "enabled": 1 } }, "kdump": { "100": { "checksum": "", "enabled": 1 } }, "kdumpgui": { "100": { "checksum": "", "enabled": 1 } }, "keepalived": { "100": { "checksum": "", "enabled": 1 } }, "kerberos": { "100": { "checksum": "", "enabled": 1 } }, "keyboardd": { "100": { "checksum": "", "enabled": 1 } }, "keystone": { "100": { "checksum": "", "enabled": 1 } }, "kismet": { "100": { "checksum": "", "enabled": 1 } }, "kmscon": { "100": { "checksum": "", "enabled": 1 } }, "kpatch": { "100": { "checksum": "", "enabled": 1 } }, "ksmtuned": { "100": { "checksum": "", "enabled": 1 } }, "ktalk": { "100": { "checksum": "", "enabled": 1 } }, "l2tp": { "100": { "checksum": "", "enabled": 1 } }, "ldap": { "100": { "checksum": "", "enabled": 1 } }, "libraries": { "100": { "checksum": "", "enabled": 1 } }, "likewise": { "100": { "checksum": "", "enabled": 1 } }, "linuxptp": { "100": { "checksum": "", "enabled": 1 } }, "lircd": { "100": { "checksum": "", "enabled": 1 } }, "livecd": { "100": { "checksum": "", "enabled": 1 } }, "lldpad": { "100": { "checksum": "", "enabled": 1 } }, "loadkeys": { "100": { "checksum": "", "enabled": 1 } }, "locallogin": { "100": { "checksum": "", "enabled": 1 } }, "lockdev": { "100": { "checksum": "", "enabled": 1 } }, "logadm": { "100": { "checksum": "", "enabled": 1 } }, "logging": { "100": { "checksum": "", "enabled": 1 } }, "logrotate": { "100": { "checksum": "", "enabled": 1 } }, "logwatch": { "100": { "checksum": "", "enabled": 1 } }, "lpd": { "100": { "checksum": "", "enabled": 1 } }, "lsm": { "100": { "checksum": "", "enabled": 1 } }, "lttng-tools": { "100": { "checksum": "", "enabled": 1 } }, "lvm": { "100": { "checksum": "", "enabled": 1 } }, "mailman": { "100": { "checksum": "", "enabled": 1 } }, "mailscanner": { "100": { "checksum": "", "enabled": 1 } }, "man2html": { "100": { "checksum": "", "enabled": 1 } }, "mandb": { "100": { "checksum": "", "enabled": 1 } }, "mcelog": { "100": { "checksum": "", "enabled": 1 } }, "mediawiki": { "100": { "checksum": "", "enabled": 1 } }, "memcached": { "100": { "checksum": "", "enabled": 1 } }, "milter": { "100": { "checksum": "", "enabled": 1 } }, "minidlna": { "100": { "checksum": "", "enabled": 1 } }, "minissdpd": { "100": { "checksum": "", "enabled": 1 } }, "mip6d": { "100": { "checksum": "", "enabled": 1 } }, "mirrormanager": { "100": { "checksum": "", "enabled": 1 } }, "miscfiles": { "100": { "checksum": "", "enabled": 1 } }, "mock": { "100": { "checksum": "", "enabled": 1 } }, "modemmanager": { "100": { "checksum": "", "enabled": 1 } }, "modutils": { "100": { "checksum": "", "enabled": 1 } }, "mojomojo": { "100": { "checksum": "", "enabled": 1 } }, "mon_statd": { "100": { "checksum": "", "enabled": 1 } }, "mongodb": { "100": { "checksum": "", "enabled": 1 } }, "motion": { "100": { "checksum": "", "enabled": 1 } }, "mount": { "100": { "checksum": "", "enabled": 1 } }, "mozilla": { "100": { "checksum": "", "enabled": 1 } }, "mpd": { "100": { "checksum": "", "enabled": 1 } }, "mplayer": { "100": { "checksum": "", "enabled": 1 } }, "mrtg": { "100": { "checksum": "", "enabled": 1 } }, "mta": { "100": { "checksum": "", "enabled": 1 } }, "munin": { "100": { "checksum": "", "enabled": 1 } }, "mysql": { "100": { "checksum": "", "enabled": 1 } }, "mythtv": { "100": { "checksum": "", "enabled": 1 } }, "nagios": { "100": { "checksum": "", "enabled": 1 } }, "namespace": { "100": { "checksum": "", "enabled": 1 } }, "ncftool": { "100": { "checksum": "", "enabled": 1 } }, "netlabel": { "100": { "checksum": "", "enabled": 1 } }, "netutils": { "100": { "checksum": "", "enabled": 1 } }, "networkmanager": { "100": { "checksum": "", "enabled": 1 } }, "ninfod": { "100": { "checksum": "", "enabled": 1 } }, "nis": { "100": { "checksum": "", "enabled": 1 } }, "nova": { "100": { "checksum": "", "enabled": 1 } }, "nscd": { "100": { "checksum": "", "enabled": 1 } }, "nsd": { "100": { "checksum": "", "enabled": 1 } }, "nslcd": { "100": { "checksum": "", "enabled": 1 } }, "ntop": { "100": { "checksum": "", "enabled": 1 } }, "ntp": { "100": { "checksum": "", "enabled": 1 } }, "numad": { "100": { "checksum": "", "enabled": 1 } }, "nut": { "100": { "checksum": "", "enabled": 1 } }, "nx": { "100": { "checksum": "", "enabled": 1 } }, "obex": { "100": { "checksum": "", "enabled": 1 } }, "oddjob": { "100": { "checksum": "", "enabled": 1 } }, "openct": { "100": { "checksum": "", "enabled": 1 } }, "opendnssec": { "100": { "checksum": "", "enabled": 1 } }, "openhpid": { "100": { "checksum": "", "enabled": 1 } }, "openshift": { "100": { "checksum": "", "enabled": 1 } }, "openshift-origin": { "100": { "checksum": "", "enabled": 1 } }, "opensm": { "100": { "checksum": "", "enabled": 1 } }, "openvpn": { "100": { "checksum": "", "enabled": 1 } }, "openvswitch": { "100": { "checksum": "", "enabled": 1 } }, "openwsman": { "100": { "checksum": "", "enabled": 1 } }, "oracleasm": { "100": { "checksum": "", "enabled": 1 } }, "osad": { "100": { "checksum": "", "enabled": 1 } }, "pads": { "100": { "checksum": "", "enabled": 1 } }, "passenger": { "100": { "checksum": "", "enabled": 1 } }, "pcmcia": { "100": { "checksum": "", "enabled": 1 } }, "pcp": { "100": { "checksum": "", "enabled": 1 } }, "pcscd": { "100": { "checksum": "", "enabled": 1 } }, "pegasus": { "100": { "checksum": "", "enabled": 1 } }, "permissivedomains": { "100": { "checksum": "", "enabled": 1 } }, "pesign": { "100": { "checksum": "", "enabled": 1 } }, "pingd": { "100": { "checksum": "", "enabled": 1 } }, "piranha": { "100": { "checksum": "", "enabled": 1 } }, "pkcs": { "100": { "checksum": "", "enabled": 1 } }, "pki": { "100": { "checksum": "", "enabled": 1 } }, "plymouthd": { "100": { "checksum": "", "enabled": 1 } }, "podsleuth": { "100": { "checksum": "", "enabled": 1 } }, "policykit": { "100": { "checksum": "", "enabled": 1 } }, "polipo": { "100": { "checksum": "", "enabled": 1 } }, "portmap": { "100": { "checksum": "", "enabled": 1 } }, "portreserve": { "100": { "checksum": "", "enabled": 1 } }, "postfix": { "100": { "checksum": "", "enabled": 1 } }, "postgresql": { "100": { "checksum": "", "enabled": 1 } }, "postgrey": { "100": { "checksum": "", "enabled": 1 } }, "ppp": { "100": { "checksum": "", "enabled": 1 } }, "prelink": { "100": { "checksum": "", "enabled": 1 } }, "prelude": { "100": { "checksum": "", "enabled": 1 } }, "privoxy": { "100": { "checksum": "", "enabled": 1 } }, "procmail": { "100": { "checksum": "", "enabled": 1 } }, "prosody": { "100": { "checksum": "", "enabled": 1 } }, "psad": { "100": { "checksum": "", "enabled": 1 } }, "ptchown": { "100": { "checksum": "", "enabled": 1 } }, "publicfile": { "100": { "checksum": "", "enabled": 1 } }, "pulseaudio": { "100": { "checksum": "", "enabled": 1 } }, "puppet": { "100": { "checksum": "", "enabled": 1 } }, "pwauth": { "100": { "checksum": "", "enabled": 1 } }, "qmail": { "100": { "checksum": "", "enabled": 1 } }, "qpid": { "100": { "checksum": "", "enabled": 1 } }, "quantum": { "100": { "checksum": "", "enabled": 1 } }, "quota": { "100": { "checksum": "", "enabled": 1 } }, "rabbitmq": { "100": { "checksum": "", "enabled": 1 } }, "radius": { "100": { "checksum": "", "enabled": 1 } }, "radvd": { "100": { "checksum": "", "enabled": 1 } }, "raid": { "100": { "checksum": "", "enabled": 1 } }, "rasdaemon": { "100": { "checksum": "", "enabled": 1 } }, "rdisc": { "100": { "checksum": "", "enabled": 1 } }, "readahead": { "100": { "checksum": "", "enabled": 1 } }, "realmd": { "100": { "checksum": "", "enabled": 1 } }, "redis": { "100": { "checksum": "", "enabled": 1 } }, "remotelogin": { "100": { "checksum": "", "enabled": 1 } }, "restraint": { "400": { "checksum": "", "enabled": 1 } }, "rhcs": { "100": { "checksum": "", "enabled": 1 } }, "rhev": { "100": { "checksum": "", "enabled": 1 } }, "rhgb": { "100": { "checksum": "", "enabled": 1 } }, "rhnsd": { "100": { "checksum": "", "enabled": 1 } }, "rhsmcertd": { "100": { "checksum": "", "enabled": 1 } }, "rhts": { "400": { "checksum": "", "enabled": 1 } }, "ricci": { "100": { "checksum": "", "enabled": 1 } }, "rkhunter": { "100": { "checksum": "", "enabled": 1 } }, "rlogin": { "100": { "checksum": "", "enabled": 1 } }, "rngd": { "100": { "checksum": "", "enabled": 1 } }, "roundup": { "100": { "checksum": "", "enabled": 1 } }, "rpc": { "100": { "checksum": "", "enabled": 1 } }, "rpcbind": { "100": { "checksum": "", "enabled": 1 } }, "rpm": { "100": { "checksum": "", "enabled": 1 } }, "rshd": { "100": { "checksum": "", "enabled": 1 } }, "rssh": { "100": { "checksum": "", "enabled": 1 } }, "rsync": { "100": { "checksum": "", "enabled": 1 } }, "rtas": { "100": { "checksum": "", "enabled": 1 } }, "rtkit": { "100": { "checksum": "", "enabled": 1 } }, "rwho": { "100": { "checksum": "", "enabled": 1 } }, "samba": { "100": { "checksum": "", "enabled": 1 } }, "sambagui": { "100": { "checksum": "", "enabled": 1 } }, "sandboxX": { "100": { "checksum": "", "enabled": 1 } }, "sanlock": { "100": { "checksum": "", "enabled": 1 } }, "sasl": { "100": { "checksum": "", "enabled": 1 } }, "sbd": { "100": { "checksum": "", "enabled": 1 } }, "sblim": { "100": { "checksum": "", "enabled": 1 } }, "screen": { "100": { "checksum": "", "enabled": 1 } }, "secadm": { "100": { "checksum": "", "enabled": 1 } }, "sectoolm": { "100": { "checksum": "", "enabled": 1 } }, "selinuxutil": { "100": { "checksum": "", "enabled": 1 } }, "sendmail": { "100": { "checksum": "", "enabled": 1 } }, "sensord": { "100": { "checksum": "", "enabled": 1 } }, "setrans": { "100": { "checksum": "", "enabled": 1 } }, "setroubleshoot": { "100": { "checksum": "", "enabled": 1 } }, "seunshare": { "100": { "checksum": "", "enabled": 1 } }, "sge": { "100": { "checksum": "", "enabled": 1 } }, "shorewall": { "100": { "checksum": "", "enabled": 1 } }, "slocate": { "100": { "checksum": "", "enabled": 1 } }, "slpd": { "100": { "checksum": "", "enabled": 1 } }, "smartmon": { "100": { "checksum": "", "enabled": 1 } }, "smokeping": { "100": { "checksum": "", "enabled": 1 } }, "smoltclient": { "100": { "checksum": "", "enabled": 1 } }, "smsd": { "100": { "checksum": "", "enabled": 1 } }, "snapper": { "100": { "checksum": "", "enabled": 1 } }, "snmp": { "100": { "checksum": "", "enabled": 1 } }, "snort": { "100": { "checksum": "", "enabled": 1 } }, "sosreport": { "100": { "checksum": "", "enabled": 1 } }, "soundserver": { "100": { "checksum": "", "enabled": 1 } }, "spamassassin": { "100": { "checksum": "", "enabled": 1 } }, "speech-dispatcher": { "100": { "checksum": "", "enabled": 1 } }, "squid": { "100": { "checksum": "", "enabled": 1 } }, "ssh": { "100": { "checksum": "", "enabled": 1 } }, "sssd": { "100": { "checksum": "", "enabled": 1 } }, "staff": { "100": { "checksum": "", "enabled": 1 } }, "stapserver": { "100": { "checksum": "", "enabled": 1 } }, "stunnel": { "100": { "checksum": "", "enabled": 1 } }, "su": { "100": { "checksum": "", "enabled": 1 } }, "sudo": { "100": { "checksum": "", "enabled": 1 } }, "svnserve": { "100": { "checksum": "", "enabled": 1 } }, "swift": { "100": { "checksum": "", "enabled": 1 } }, "sysadm": { "100": { "checksum": "", "enabled": 1 } }, "sysadm_secadm": { "100": { "checksum": "", "enabled": 1 } }, "sysnetwork": { "100": { "checksum": "", "enabled": 1 } }, "sysstat": { "100": { "checksum": "", "enabled": 1 } }, "systemd": { "100": { "checksum": "", "enabled": 1 } }, "tangd": { "100": { "checksum": "", "enabled": 1 } }, "targetd": { "100": { "checksum": "", "enabled": 1 } }, "tcpd": { "100": { "checksum": "", "enabled": 1 } }, "tcsd": { "100": { "checksum": "", "enabled": 1 } }, "telepathy": { "100": { "checksum": "", "enabled": 1 } }, "telnet": { "100": { "checksum": "", "enabled": 1 } }, "tftp": { "100": { "checksum": "", "enabled": 1 } }, "tgtd": { "100": { "checksum": "", "enabled": 1 } }, "thin": { "100": { "checksum": "", "enabled": 1 } }, "thumb": { "100": { "checksum": "", "enabled": 1 } }, "tlp": { "100": { "checksum": "", "enabled": 1 } }, "tmpreaper": { "100": { "checksum": "", "enabled": 1 } }, "tomcat": { "100": { "checksum": "", "enabled": 1 } }, "tor": { "100": { "checksum": "", "enabled": 1 } }, "tuned": { "100": { "checksum": "", "enabled": 1 } }, "tvtime": { "100": { "checksum": "", "enabled": 1 } }, "udev": { "100": { "checksum": "", "enabled": 1 } }, "ulogd": { "100": { "checksum": "", "enabled": 1 } }, "uml": { "100": { "checksum": "", "enabled": 1 } }, "unconfined": { "100": { "checksum": "", "enabled": 1 } }, "unconfineduser": { "100": { "checksum": "", "enabled": 1 } }, "unlabelednet": { "100": { "checksum": "", "enabled": 1 } }, "unprivuser": { "100": { "checksum": "", "enabled": 1 } }, "updfstab": { "100": { "checksum": "", "enabled": 1 } }, "usbmodules": { "100": { "checksum": "", "enabled": 1 } }, "usbmuxd": { "100": { "checksum": "", "enabled": 1 } }, "userdomain": { "100": { "checksum": "", "enabled": 1 } }, "userhelper": { "100": { "checksum": "", "enabled": 1 } }, "usermanage": { "100": { "checksum": "", "enabled": 1 } }, "usernetctl": { "100": { "checksum": "", "enabled": 1 } }, "uucp": { "100": { "checksum": "", "enabled": 1 } }, "uuidd": { "100": { "checksum": "", "enabled": 1 } }, "varnishd": { "100": { "checksum": "", "enabled": 1 } }, "vdagent": { "100": { "checksum": "", "enabled": 1 } }, "vhostmd": { "100": { "checksum": "", "enabled": 1 } }, "virt": { "100": { "checksum": "", "enabled": 1 } }, "vlock": { "100": { "checksum": "", "enabled": 1 } }, "vmtools": { "100": { "checksum": "", "enabled": 1 } }, "vmware": { "100": { "checksum": "", "enabled": 1 } }, "vnstatd": { "100": { "checksum": "", "enabled": 1 } }, "vpn": { "100": { "checksum": "", "enabled": 1 } }, "w3c": { "100": { "checksum": "", "enabled": 1 } }, "watchdog": { "100": { "checksum": "", "enabled": 1 } }, "wdmd": { "100": { "checksum": "", "enabled": 1 } }, "webadm": { "100": { "checksum": "", "enabled": 1 } }, "webalizer": { "100": { "checksum": "", "enabled": 1 } }, "wine": { "100": { "checksum": "", "enabled": 1 } }, "wireshark": { "100": { "checksum": "", "enabled": 1 } }, "xen": { "100": { "checksum": "", "enabled": 1 } }, "xguest": { "100": { "checksum": "", "enabled": 1 } }, "xserver": { "100": { "checksum": "", "enabled": 1 } }, "zabbix": { "100": { "checksum": "", "enabled": 1 } }, "zarafa": { "100": { "checksum": "", "enabled": 1 } }, "zebra": { "100": { "checksum": "", "enabled": 1 } }, "zoneminder": { "100": { "checksum": "", "enabled": 1 } }, "zosremote": { "100": { "checksum": "", "enabled": 1 } } }, "selinux_priorities": true }, "changed": false } TASK [fedora.linux_system_roles.selinux : Load SELinux modules] **************** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:115 Sunday 12 May 2024 04:41:13 +0000 (0:00:03.230) 0:00:19.532 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Restore SELinux labels on filesystem tree] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:128 Sunday 12 May 2024 04:41:13 +0000 (0:00:00.070) 0:00:19.602 ************ TASK [fedora.linux_system_roles.selinux : Restore SELinux labels on filesystem tree in check mode] *** task path: /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:136 Sunday 12 May 2024 04:41:13 +0000 (0:00:00.037) 0:00:19.640 ************ TASK [linux-system-roles.vpn : Ensure OpenSSL is installed on the controller] *** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:27 Sunday 12 May 2024 04:41:13 +0000 (0:00:00.028) 0:00:19.669 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Enforce default auth method as needed] ********** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:35 Sunday 12 May 2024 04:41:13 +0000 (0:00:00.036) 0:00:19.705 ************ ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "psk", "hosts": { "host01.local": { "subnets": [ "192.0.2.0/24", "198.51.100.0/24", "203.0.113.0/24" ] }, "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [linux-system-roles.vpn : Make sure that the hosts list is not empty] ***** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:45 Sunday 12 May 2024 04:41:13 +0000 (0:00:00.028) 0:00:19.734 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Make sure there is at least one pair of hosts in each connection] *** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:60 Sunday 12 May 2024 04:41:13 +0000 (0:00:00.028) 0:00:19.763 ************ ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "psk", "hosts": { "host01.local": { "subnets": [ "192.0.2.0/24", "198.51.100.0/24", "203.0.113.0/24" ] }, "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [linux-system-roles.vpn : Ensure cert_names are populated when auth_method is cert] *** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:74 Sunday 12 May 2024 04:41:13 +0000 (0:00:00.032) 0:00:19.795 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Generate PSKs or use provided shared_key_content] *** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:101 Sunday 12 May 2024 04:41:13 +0000 (0:00:00.032) 0:00:19.828 ************ ok: [sut -> localhost] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [linux-system-roles.vpn : Set psks for hosts] ***************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:138 Sunday 12 May 2024 04:41:13 +0000 (0:00:00.045) 0:00:19.873 ************ ok: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [linux-system-roles.vpn : Create ipsec.conf files] ************************ task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:162 Sunday 12 May 2024 04:41:13 +0000 (0:00:00.079) 0:00:19.952 ************ changed: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": true, "checksum": "66ef88a106eae109d3c11a81d20c8d2568f9f6a5", "dest": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "gid": 0, "group": "root", "item": "host01.local", "md5sum": "522bea6fa2ae4cda524aea05f78b7bc3", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 261, "src": "/root/.ansible/tmp/ansible-tmp-1715488873.5688016-4273-214778397374760/source", "state": "file", "uid": 0 } changed: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": true, "checksum": "d2286689d78d406a597e68150923babc26a72398", "dest": "/etc/ipsec.d/mainhost.local-to-sut.conf", "gid": 0, "group": "root", "item": "sut", "md5sum": "fa5e5e7ee66c7544a8790840cd886947", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 196, "src": "/root/.ansible/tmp/ansible-tmp-1715488874.03544-4273-214090884563530/source", "state": "file", "uid": 0 } NOTIFIED HANDLER linux-system-roles.vpn : Restart vpn service and wait for ssh conn to return for sut NOTIFIED HANDLER linux-system-roles.vpn : Restart vpn service and wait for ssh conn to return for sut TASK [linux-system-roles.vpn : Check if secrets file already exists] *********** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:170 Sunday 12 May 2024 04:41:14 +0000 (0:00:00.892) 0:00:20.845 ************ ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "exists": false } } ok: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": false, "item": "sut", "stat": { "exists": false } } TASK [linux-system-roles.vpn : Create ipsec.secrets files] ********************* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:176 Sunday 12 May 2024 04:41:14 +0000 (0:00:00.259) 0:00:21.104 ************ changed: [sut] => (item={'invocation': {'module_args': {'checksum_algorithm': 'sha1', 'get_checksum': True, 'follow': False, 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'get_md5': False, 'get_mime': True, 'get_attributes': True}}, 'stat': {'exists': False}, 'changed': False, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "d9251749b630ee24783fe296db547dbb78cff9f9", "dest": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "stat": { "exists": false } }, "md5sum": "941bef63b112965443f1168ffe306e15", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 144, "src": "/root/.ansible/tmp/ansible-tmp-1715488874.7174594-4295-44726039769973/source", "state": "file", "uid": 0 } changed: [sut] => (item={'invocation': {'module_args': {'checksum_algorithm': 'sha1', 'get_checksum': True, 'follow': False, 'path': '/etc/ipsec.d/mainhost.local-to-sut.secrets', 'get_md5': False, 'get_mime': True, 'get_attributes': True}}, 'stat': {'exists': False}, 'changed': False, 'failed': False, 'item': 'sut', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "76f4f01eff8e1d60dd1c553ebf65ae281b8dc1f4", "dest": "/etc/ipsec.d/mainhost.local-to-sut.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-sut.secrets" } }, "item": "sut", "stat": { "exists": false } }, "md5sum": "e9de68a908ae93bc53685052ac9f4fb5", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 142, "src": "/root/.ansible/tmp/ansible-tmp-1715488875.0975375-4295-248819152124732/source", "state": "file", "uid": 0 } TASK [linux-system-roles.vpn : Build opportunistic configuration] ************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:186 Sunday 12 May 2024 04:41:15 +0000 (0:00:00.798) 0:00:21.903 ************ skipping: [sut] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } skipping: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [Assert file existence] *************************************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tests_subnet_to_subnet.yml:34 Sunday 12 May 2024 04:41:15 +0000 (0:00:00.028) 0:00:21.931 ************ included: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/assert_conf_secrets_files_exist.yml for sut TASK [Stat conf files paths] *************************************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/assert_conf_secrets_files_exist.yml:2 Sunday 12 May 2024 04:41:15 +0000 (0:00:00.029) 0:00:21.961 ************ ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "atime": 1715488873.9660769, "attr_flags": "e", "attributes": [ "extents" ], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "66ef88a106eae109d3c11a81d20c8d2568f9f6a5", "ctime": 1715488873.972077, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 262515, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1715488873.7480772, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 261, "uid": 0, "version": "18446744072703200346", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Stat secrets files paths] ************************************************ task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/assert_conf_secrets_files_exist.yml:8 Sunday 12 May 2024 04:41:15 +0000 (0:00:00.153) 0:00:22.115 ************ ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "atime": 1715488875.0290763, "attr_flags": "e", "attributes": [ "extents" ], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "d9251749b630ee24783fe296db547dbb78cff9f9", "ctime": 1715488875.0330763, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 263527, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1715488874.8950763, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 144, "uid": 0, "version": "18446744072703200369", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Assert that ipsec.conf and secrets files exist] ************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/assert_conf_secrets_files_exist.yml:14 Sunday 12 May 2024 04:41:15 +0000 (0:00:00.150) 0:00:22.265 ************ ok: [sut] => (item={'invocation': {'module_args': {'checksum_algorithm': 'sha1', 'get_checksum': True, 'follow': False, 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'get_md5': False, 'get_mime': True, 'get_attributes': True}}, 'stat': {'charset': 'us-ascii', 'uid': 0, 'exists': True, 'attr_flags': 'e', 'woth': False, 'isreg': True, 'device_type': 0, 'mtime': 1715488873.7480772, 'block_size': 4096, 'inode': 262515, 'isgid': False, 'size': 261, 'executable': False, 'isuid': False, 'readable': True, 'version': '18446744072703200346', 'pw_name': 'root', 'gid': 0, 'ischr': False, 'wusr': True, 'writeable': True, 'mimetype': 'text/plain', 'blocks': 8, 'xoth': False, 'islnk': False, 'nlink': 1, 'issock': False, 'rgrp': True, 'gr_name': 'root', 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'xusr': False, 'atime': 1715488873.9660769, 'isdir': False, 'ctime': 1715488873.972077, 'isblk': False, 'wgrp': False, 'checksum': '66ef88a106eae109d3c11a81d20c8d2568f9f6a5', 'dev': 51713, 'roth': True, 'isfifo': False, 'mode': '0644', 'xgrp': False, 'rusr': True, 'attributes': ['extents']}, 'changed': False, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } }, "item": "host01.local", "stat": { "atime": 1715488873.9660769, "attr_flags": "e", "attributes": [ "extents" ], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "66ef88a106eae109d3c11a81d20c8d2568f9f6a5", "ctime": 1715488873.972077, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 262515, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1715488873.7480772, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 261, "uid": 0, "version": "18446744072703200346", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed TASK [Assert that ipsec.conf and secrets files exist] ************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/assert_conf_secrets_files_exist.yml:20 Sunday 12 May 2024 04:41:15 +0000 (0:00:00.031) 0:00:22.297 ************ ok: [sut] => (item={'invocation': {'module_args': {'checksum_algorithm': 'sha1', 'get_checksum': True, 'follow': False, 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'get_md5': False, 'get_mime': True, 'get_attributes': True}}, 'stat': {'charset': 'us-ascii', 'uid': 0, 'exists': True, 'attr_flags': 'e', 'woth': False, 'isreg': True, 'device_type': 0, 'mtime': 1715488874.8950763, 'block_size': 4096, 'inode': 263527, 'isgid': False, 'size': 144, 'executable': False, 'isuid': False, 'readable': True, 'version': '18446744072703200369', 'pw_name': 'root', 'gid': 0, 'ischr': False, 'wusr': True, 'writeable': True, 'mimetype': 'text/plain', 'blocks': 8, 'xoth': False, 'islnk': False, 'nlink': 1, 'issock': False, 'rgrp': False, 'gr_name': 'root', 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'xusr': False, 'atime': 1715488875.0290763, 'isdir': False, 'ctime': 1715488875.0330763, 'isblk': False, 'wgrp': False, 'checksum': 'd9251749b630ee24783fe296db547dbb78cff9f9', 'dev': 51713, 'roth': False, 'isfifo': False, 'mode': '0600', 'xgrp': False, 'rusr': True, 'attributes': ['extents']}, 'changed': False, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "stat": { "atime": 1715488875.0290763, "attr_flags": "e", "attributes": [ "extents" ], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "d9251749b630ee24783fe296db547dbb78cff9f9", "ctime": 1715488875.0330763, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 263527, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1715488874.8950763, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 144, "uid": 0, "version": "18446744072703200369", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed TASK [Reset success flag] ****************************************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tests_subnet_to_subnet.yml:37 Sunday 12 May 2024 04:41:15 +0000 (0:00:00.030) 0:00:22.328 ************ ok: [sut] => { "ansible_facts": { "__vpn_success": true }, "changed": false } TASK [Get and store conf files] ************************************************ task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tests_subnet_to_subnet.yml:41 Sunday 12 May 2024 04:41:15 +0000 (0:00:00.015) 0:00:22.343 ************ ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpjb25uIG1haW5ob3N0LmxvY2FsLXRvLWhvc3QwMS5sb2NhbAogIGxlZnQ9bWFpbmhvc3QubG9jYWwKICBsZWZ0aWQ9QG1haW5ob3N0LmxvY2FsCiAgcmlnaHQ9aG9zdDAxLmxvY2FsCiAgcmlnaHRpZD1AaG9zdDAxLmxvY2FsCiAgcmlnaHRzdWJuZXRzPXsxOTIuMC4yLjAvMjQsMTk4LjUxLjEwMC4wLzI0LDIwMy4wLjExMy4wLzI0fQogIGlrZXYyPWluc2lzdAogIGF1dGhieT1zZWNyZXQK", "encoding": "base64", "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } TASK [Check that conf file contains correct information] *********************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tests_subnet_to_subnet.yml:47 Sunday 12 May 2024 04:41:16 +0000 (0:00:00.227) 0:00:22.571 ************ skipping: [sut] => (item={'content': 'IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpjb25uIG1haW5ob3N0LmxvY2FsLXRvLWhvc3QwMS5sb2NhbAogIGxlZnQ9bWFpbmhvc3QubG9jYWwKICBsZWZ0aWQ9QG1haW5ob3N0LmxvY2FsCiAgcmlnaHQ9aG9zdDAxLmxvY2FsCiAgcmlnaHRpZD1AaG9zdDAxLmxvY2FsCiAgcmlnaHRzdWJuZXRzPXsxOTIuMC4yLjAvMjQsMTk4LjUxLjEwMC4wLzI0LDIwMy4wLjExMy4wLzI0fQogIGlrZXYyPWluc2lzdAogIGF1dGhieT1zZWNyZXQK', 'source': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host01.local.conf'}}, 'failed': False, 'changed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "idx": 0, "item": { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCiMgc3lzdGVtX3JvbGU6dnBuCgpjb25uIG1haW5ob3N0LmxvY2FsLXRvLWhvc3QwMS5sb2NhbAogIGxlZnQ9bWFpbmhvc3QubG9jYWwKICBsZWZ0aWQ9QG1haW5ob3N0LmxvY2FsCiAgcmlnaHQ9aG9zdDAxLmxvY2FsCiAgcmlnaHRpZD1AaG9zdDAxLmxvY2FsCiAgcmlnaHRzdWJuZXRzPXsxOTIuMC4yLjAvMjQsMTk4LjUxLjEwMC4wLzI0LDIwMy4wLjExMy4wLzI0fQogIGlrZXYyPWluc2lzdAogIGF1dGhieT1zZWNyZXQK", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } }, "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" }, "skip_reason": "Conditional result was False" } TASK [Assert success for conf files] ******************************************* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tests_subnet_to_subnet.yml:57 Sunday 12 May 2024 04:41:16 +0000 (0:00:00.043) 0:00:22.615 ************ ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Check the firewall and the selinux port status] ************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tests_subnet_to_subnet.yml:62 Sunday 12 May 2024 04:41:16 +0000 (0:00:00.032) 0:00:22.647 ************ included: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/check_firewall_selinux.yml for sut TASK [Get firewall service] **************************************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/check_firewall_selinux.yml:9 Sunday 12 May 2024 04:41:16 +0000 (0:00:00.031) 0:00:22.678 ************ ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--list-services" ], "delta": "0:00:00.299682", "end": "2024-05-12 04:41:16.673566", "rc": 0, "start": "2024-05-12 04:41:16.373884" } STDOUT: dhcpv6-client ipsec ssh TASK [Ensure 'ipsec' is in the firewalld service list] ************************* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/check_firewall_selinux.yml:14 Sunday 12 May 2024 04:41:16 +0000 (0:00:00.449) 0:00:23.128 ************ ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get associated selinux ports] ******************************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/check_firewall_selinux.yml:19 Sunday 12 May 2024 04:41:16 +0000 (0:00:00.061) 0:00:23.189 ************ ok: [sut] => { "changed": false, "cmd": "set -euo pipefail\nfirewall-cmd --info-service=ipsec | egrep \"^ +ports: +\" | sed -e \"s/ *ports: //\"", "delta": "0:00:00.294997", "end": "2024-05-12 04:41:17.180702", "rc": 0, "start": "2024-05-12 04:41:16.885705" } STDOUT: 500/udp 4500/udp TASK [Check associated selinux ports when vpn_manage_selinux is true] ********** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/check_firewall_selinux.yml:27 Sunday 12 May 2024 04:41:17 +0000 (0:00:00.444) 0:00:23.634 ************ ok: [sut] => (item=500/udp) => { "ansible_loop_var": "item", "changed": false, "cmd": "set -euo pipefail\nsemanage port --list -C | grep ipsecnat_port_t | grep \"500\" | grep \"udp\"", "delta": "0:00:00.268194", "end": "2024-05-12 04:41:17.608162", "item": "500/udp", "rc": 0, "start": "2024-05-12 04:41:17.339968" } STDOUT: ipsecnat_port_t udp 500, 4500 ok: [sut] => (item=4500/udp) => { "ansible_loop_var": "item", "changed": false, "cmd": "set -euo pipefail\nsemanage port --list -C | grep ipsecnat_port_t | grep \"4500\" | grep \"udp\"", "delta": "0:00:00.171126", "end": "2024-05-12 04:41:17.912847", "item": "4500/udp", "rc": 0, "start": "2024-05-12 04:41:17.741721" } STDOUT: ipsecnat_port_t udp 500, 4500 TASK [Cleanup] ***************************************************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tests_subnet_to_subnet.yml:65 Sunday 12 May 2024 04:41:17 +0000 (0:00:00.734) 0:00:24.368 ************ included: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/cleanup.yml for sut TASK [Set platform/version specific variables] ********************************* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/cleanup.yml:2 Sunday 12 May 2024 04:41:17 +0000 (0:00:00.031) 0:00:24.399 ************ TASK [linux-system-roles.vpn : Ensure ansible_facts used by role] ************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:2 Sunday 12 May 2024 04:41:18 +0000 (0:00:00.034) 0:00:24.434 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Check if system is ostree] ********************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:11 Sunday 12 May 2024 04:41:18 +0000 (0:00:00.029) 0:00:24.463 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Set flag to indicate system is ostree] ********** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:16 Sunday 12 May 2024 04:41:18 +0000 (0:00:00.025) 0:00:24.489 ************ skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml:20 Sunday 12 May 2024 04:41:18 +0000 (0:00:00.025) 0:00:24.515 ************ skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=CentOS_7.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/vars/CentOS_7.yml" ], "ansible_loop_var": "item", "changed": false, "item": "CentOS_7.yml" } skipping: [sut] => (item=CentOS_7.9.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_7.9.yml", "skip_reason": "Conditional result was False" } TASK [Get service facts] ******************************************************* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/cleanup.yml:8 Sunday 12 May 2024 04:41:18 +0000 (0:00:00.048) 0:00:24.564 ************ ok: [sut] => { "ansible_facts": { "services": { "NetworkManager-dispatcher.service": { "name": "NetworkManager-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "NetworkManager-wait-online.service": { "name": "NetworkManager-wait-online.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "NetworkManager.service": { "name": "NetworkManager.service", "source": "systemd", "state": "running", "status": "enabled" }, "arp-ethers.service": { "name": "arp-ethers.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "auditd.service": { "name": "auditd.service", "source": "systemd", "state": "running", "status": "enabled" }, "auth-rpcgss-module.service": { "name": "auth-rpcgss-module.service", "source": "systemd", "state": "stopped", "status": "static" }, "autovt@.service": { "name": "autovt@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "blk-availability.service": { "name": "blk-availability.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "brandbot.service": { "name": "brandbot.service", "source": "systemd", "state": "inactive", "status": "static" }, "chrony-dnssrv@.service": { "name": "chrony-dnssrv@.service", "source": "systemd", "state": "unknown", "status": "static" }, "chrony-wait.service": { "name": "chrony-wait.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "chronyd.service": { "name": "chronyd.service", "source": "systemd", "state": "running", "status": "enabled" }, "cloud-config.service": { "name": "cloud-config.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-final.service": { "name": "cloud-final.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init-local.service": { "name": "cloud-init-local.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init.service": { "name": "cloud-init.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "console-getty.service": { "name": "console-getty.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "console-shell.service": { "name": "console-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "container-getty@.service": { "name": "container-getty@.service", "source": "systemd", "state": "unknown", "status": "static" }, "cpupower.service": { "name": "cpupower.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "crond.service": { "name": "crond.service", "source": "systemd", "state": "running", "status": "enabled" }, "dbus-org.fedoraproject.FirewallD1.service": { "name": "dbus-org.fedoraproject.FirewallD1.service", "source": "systemd", "state": "active", "status": "enabled" }, "dbus-org.freedesktop.hostname1.service": { "name": "dbus-org.freedesktop.hostname1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.import1.service": { "name": "dbus-org.freedesktop.import1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.locale1.service": { "name": "dbus-org.freedesktop.locale1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.login1.service": { "name": "dbus-org.freedesktop.login1.service", "source": "systemd", "state": "active", "status": "static" }, "dbus-org.freedesktop.machine1.service": { "name": "dbus-org.freedesktop.machine1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.nm-dispatcher.service": { "name": "dbus-org.freedesktop.nm-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus-org.freedesktop.timedate1.service": { "name": "dbus-org.freedesktop.timedate1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus.service": { "name": "dbus.service", "source": "systemd", "state": "running", "status": "static" }, "debug-shell.service": { "name": "debug-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "dracut-cmdline.service": { "name": "dracut-cmdline.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-initqueue.service": { "name": "dracut-initqueue.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-mount.service": { "name": "dracut-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-mount.service": { "name": "dracut-pre-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-pivot.service": { "name": "dracut-pre-pivot.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-trigger.service": { "name": "dracut-pre-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-udev.service": { "name": "dracut-pre-udev.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown.service": { "name": "dracut-shutdown.service", "source": "systemd", "state": "stopped", "status": "static" }, "ebtables.service": { "name": "ebtables.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "emergency.service": { "name": "emergency.service", "source": "systemd", "state": "stopped", "status": "static" }, "firewalld.service": { "name": "firewalld.service", "source": "systemd", "state": "running", "status": "enabled" }, "fstrim.service": { "name": "fstrim.service", "source": "systemd", "state": "inactive", "status": "static" }, "getty@.service": { "name": "getty@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "getty@tty1.service": { "name": "getty@tty1.service", "source": "systemd", "state": "running", "status": "unknown" }, "gssproxy.service": { "name": "gssproxy.service", "source": "systemd", "state": "running", "status": "disabled" }, "halt-local.service": { "name": "halt-local.service", "source": "systemd", "state": "inactive", "status": "static" }, "initrd-cleanup.service": { "name": "initrd-cleanup.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-parse-etc.service": { "name": "initrd-parse-etc.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-switch-root.service": { "name": "initrd-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-udevadm-cleanup-db.service": { "name": "initrd-udevadm-cleanup-db.service", "source": "systemd", "state": "stopped", "status": "static" }, "iprdump.service": { "name": "iprdump.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprinit.service": { "name": "iprinit.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprupdate.service": { "name": "iprupdate.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ipsec.service": { "name": "ipsec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "irqbalance.service": { "name": "irqbalance.service", "source": "systemd", "state": "running", "status": "enabled" }, "kdump.service": { "name": "kdump.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "kmod-static-nodes.service": { "name": "kmod-static-nodes.service", "source": "systemd", "state": "stopped", "status": "static" }, "messagebus.service": { "name": "messagebus.service", "source": "systemd", "state": "active", "status": "static" }, "microcode.service": { "name": "microcode.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "netconsole": { "name": "netconsole", "source": "sysv", "state": "stopped", "status": "disabled" }, "network": { "name": "network", "source": "sysv", "state": "running", "status": "enabled" }, "network.service": { "name": "network.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "nfs-blkmap.service": { "name": "nfs-blkmap.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-config.service": { "name": "nfs-config.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-idmap.service": { "name": "nfs-idmap.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-idmapd.service": { "name": "nfs-idmapd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-lock.service": { "name": "nfs-lock.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-mountd.service": { "name": "nfs-mountd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-rquotad.service": { "name": "nfs-rquotad.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-secure.service": { "name": "nfs-secure.service", "source": "systemd", "state": "inactive", "status": "static" }, "nfs-server.service": { "name": "nfs-server.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nfs-utils.service": { "name": "nfs-utils.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs.service": { "name": "nfs.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfslock.service": { "name": "nfslock.service", "source": "systemd", "state": "inactive", "status": "static" }, "ntpdate.service": { "name": "ntpdate.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-halt.service": { "name": "plymouth-halt.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-kexec.service": { "name": "plymouth-kexec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-poweroff.service": { "name": "plymouth-poweroff.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-quit-wait.service": { "name": "plymouth-quit-wait.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-quit.service": { "name": "plymouth-quit.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-read-write.service": { "name": "plymouth-read-write.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-reboot.service": { "name": "plymouth-reboot.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-start.service": { "name": "plymouth-start.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "plymouth-switch-root.service": { "name": "plymouth-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "polkit.service": { "name": "polkit.service", "source": "systemd", "state": "running", "status": "static" }, "postfix.service": { "name": "postfix.service", "source": "systemd", "state": "running", "status": "enabled" }, "qemu-guest-agent.service": { "name": "qemu-guest-agent.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "quotaon.service": { "name": "quotaon.service", "source": "systemd", "state": "inactive", "status": "static" }, "rc-local.service": { "name": "rc-local.service", "source": "systemd", "state": "stopped", "status": "static" }, "rdisc.service": { "name": "rdisc.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rescue.service": { "name": "rescue.service", "source": "systemd", "state": "stopped", "status": "static" }, "restraintd.service": { "name": "restraintd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rhel-autorelabel-mark.service": { "name": "rhel-autorelabel-mark.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-autorelabel.service": { "name": "rhel-autorelabel.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-configure.service": { "name": "rhel-configure.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-dmesg.service": { "name": "rhel-dmesg.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-domainname.service": { "name": "rhel-domainname.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-import-state.service": { "name": "rhel-import-state.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-loadmodules.service": { "name": "rhel-loadmodules.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rhel-readonly.service": { "name": "rhel-readonly.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "rngd.service": { "name": "rngd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpc-gssd.service": { "name": "rpc-gssd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-rquotad.service": { "name": "rpc-rquotad.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rpc-statd-notify.service": { "name": "rpc-statd-notify.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd.service": { "name": "rpc-statd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpcbind.service": { "name": "rpcbind.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpcgssd.service": { "name": "rpcgssd.service", "source": "systemd", "state": "inactive", "status": "static" }, "rpcidmapd.service": { "name": "rpcidmapd.service", "source": "systemd", "state": "inactive", "status": "static" }, "rsyncd.service": { "name": "rsyncd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rsyncd@.service": { "name": "rsyncd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "rsyslog.service": { "name": "rsyslog.service", "source": "systemd", "state": "running", "status": "enabled" }, "selinux-policy-migrate-local-changes@.service": { "name": "selinux-policy-migrate-local-changes@.service", "source": "systemd", "state": "unknown", "status": "static" }, "selinux-policy-migrate-local-changes@targeted.service": { "name": "selinux-policy-migrate-local-changes@targeted.service", "source": "systemd", "state": "stopped", "status": "unknown" }, "serial-getty@.service": { "name": "serial-getty@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "sshd-keygen.service": { "name": "sshd-keygen.service", "source": "systemd", "state": "stopped", "status": "static" }, "sshd.service": { "name": "sshd.service", "source": "systemd", "state": "running", "status": "enabled" }, "sshd@.service": { "name": "sshd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-ask-password-console.service": { "name": "systemd-ask-password-console.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-plymouth.service": { "name": "systemd-ask-password-plymouth.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-wall.service": { "name": "systemd-ask-password-wall.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-backlight@.service": { "name": "systemd-backlight@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-binfmt.service": { "name": "systemd-binfmt.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-bootchart.service": { "name": "systemd-bootchart.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-firstboot.service": { "name": "systemd-firstboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck-root.service": { "name": "systemd-fsck-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck@.service": { "name": "systemd-fsck@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-halt.service": { "name": "systemd-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hibernate-resume@.service": { "name": "systemd-hibernate-resume@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-hibernate.service": { "name": "systemd-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hostnamed.service": { "name": "systemd-hostnamed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hwdb-update.service": { "name": "systemd-hwdb-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-hybrid-sleep.service": { "name": "systemd-hybrid-sleep.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-importd.service": { "name": "systemd-importd.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-initctl.service": { "name": "systemd-initctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-catalog-update.service": { "name": "systemd-journal-catalog-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-flush.service": { "name": "systemd-journal-flush.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journald.service": { "name": "systemd-journald.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-kexec.service": { "name": "systemd-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-localed.service": { "name": "systemd-localed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-logind.service": { "name": "systemd-logind.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-machine-id-commit.service": { "name": "systemd-machine-id-commit.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-machined.service": { "name": "systemd-machined.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-modules-load.service": { "name": "systemd-modules-load.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-nspawn@.service": { "name": "systemd-nspawn@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "systemd-poweroff.service": { "name": "systemd-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-quotacheck.service": { "name": "systemd-quotacheck.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-random-seed.service": { "name": "systemd-random-seed.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-readahead-collect.service": { "name": "systemd-readahead-collect.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-readahead-done.service": { "name": "systemd-readahead-done.service", "source": "systemd", "state": "stopped", "status": "indirect" }, "systemd-readahead-drop.service": { "name": "systemd-readahead-drop.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "systemd-readahead-replay.service": { "name": "systemd-readahead-replay.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-reboot.service": { "name": "systemd-reboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-remount-fs.service": { "name": "systemd-remount-fs.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-rfkill@.service": { "name": "systemd-rfkill@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-shutdownd.service": { "name": "systemd-shutdownd.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-suspend.service": { "name": "systemd-suspend.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-sysctl.service": { "name": "systemd-sysctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-timedated.service": { "name": "systemd-timedated.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-tmpfiles-clean.service": { "name": "systemd-tmpfiles-clean.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup-dev.service": { "name": "systemd-tmpfiles-setup-dev.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup.service": { "name": "systemd-tmpfiles-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-settle.service": { "name": "systemd-udev-settle.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-udev-trigger.service": { "name": "systemd-udev-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udevd.service": { "name": "systemd-udevd.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-update-done.service": { "name": "systemd-update-done.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp-runlevel.service": { "name": "systemd-update-utmp-runlevel.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp.service": { "name": "systemd-update-utmp.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-user-sessions.service": { "name": "systemd-user-sessions.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-vconsole-setup.service": { "name": "systemd-vconsole-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "teamd@.service": { "name": "teamd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "tuned.service": { "name": "tuned.service", "source": "systemd", "state": "running", "status": "enabled" }, "unbound-anchor.service": { "name": "unbound-anchor.service", "source": "systemd", "state": "stopped", "status": "static" }, "wpa_supplicant.service": { "name": "wpa_supplicant.service", "source": "systemd", "state": "inactive", "status": "disabled" } } }, "changed": false } TASK [Stop ipsec service] ****************************************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/cleanup.yml:11 Sunday 12 May 2024 04:41:18 +0000 (0:00:00.756) 0:00:25.320 ************ ok: [sut] => { "changed": false, "enabled": false, "name": "ipsec", "state": "stopped", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "systemd-journald.socket network-online.target basic.target system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "shutdown.target", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "Internet Key Exchange (IKE) Protocol Daemon for IPsec", "DevicePolicy": "auto", "Documentation": "man:ipsec(8) man:pluto(8) man:ipsec.conf(5)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/usr/libexec/ipsec/whack ; argv[]=/usr/libexec/ipsec/whack --listen ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/libexec/ipsec/pluto ; argv[]=/usr/libexec/ipsec/pluto --leak-detective --config /etc/ipsec.conf --nofork ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/usr/sbin/ipsec ; argv[]=/usr/sbin/ipsec --checknflog ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStop": "{ path=/usr/libexec/ipsec/whack ; argv[]=/usr/libexec/ipsec/whack --shutdown ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStopPost": "{ path=/usr/sbin/ipsec ; argv[]=/usr/sbin/ipsec --stopnflog ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/ipsec.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "ipsec.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "ipsec.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "all", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target system.slice", "Restart": "always", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "notify", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "disabled", "Wants": "network-online.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "3min 20s" } } TASK [Uninstall packages] ****************************************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/cleanup.yml:18 Sunday 12 May 2024 04:41:19 +0000 (0:00:00.219) 0:00:25.539 ************ changed: [sut] => (item=libreswan) => { "ansible_loop_var": "item", "changed": true, "changes": { "removed": [ "libreswan" ] }, "item": "libreswan", "rc": 0, "results": [ "Loaded plugins: fastestmirror\nResolving Dependencies\n--> Running transaction check\n---> Package libreswan.x86_64 0:3.25-9.1.el7_8 will be erased\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nRemoving:\n libreswan x86_64 3.25-9.1.el7_8 @updates 4.7 M\n\nTransaction Summary\n================================================================================\nRemove 1 Package\n\nInstalled size: 4.7 M\nDownloading packages:\nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Erasing : libreswan-3.25-9.1.el7_8.x86_64 1/1 \n Verifying : libreswan-3.25-9.1.el7_8.x86_64 1/1 \n\nRemoved:\n libreswan.x86_64 0:3.25-9.1.el7_8 \n\nComplete!\n" ] } TASK [Remove ipsec.conf files] ************************************************* task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/cleanup.yml:43 Sunday 12 May 2024 04:41:20 +0000 (0:00:01.471) 0:00:27.011 ************ changed: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": true, "item": "host01.local", "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "state": "absent" } changed: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": true, "item": "sut", "path": "/etc/ipsec.d/mainhost.local-to-sut.conf", "state": "absent" } TASK [Remove ipsec.secrets files] ********************************************** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/cleanup.yml:49 Sunday 12 May 2024 04:41:20 +0000 (0:00:00.272) 0:00:27.284 ************ changed: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": true, "item": "host01.local", "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "state": "absent" } changed: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": true, "item": "sut", "path": "/etc/ipsec.d/mainhost.local-to-sut.secrets", "state": "absent" } RUNNING HANDLER [linux-system-roles.vpn : Restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/handlers/main.yml:2 Sunday 12 May 2024 04:41:21 +0000 (0:00:00.262) 0:00:27.546 ************ included: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [linux-system-roles.vpn : Enable and restart vpn services] ***** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:2 Sunday 12 May 2024 04:41:21 +0000 (0:00:00.024) 0:00:27.570 ************ changed: [sut] => (item=ipsec) => { "ansible_job_id": "830581243938.14608", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/830581243938.14608", "started": 1 } RUNNING HANDLER [linux-system-roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:11 Sunday 12 May 2024 04:41:21 +0000 (0:00:00.442) 0:00:28.012 ************ ok: [sut] => { "changed": false, "elapsed": 3 } RUNNING HANDLER [linux-system-roles.vpn : Restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/handlers/main.yml:2 Sunday 12 May 2024 04:41:25 +0000 (0:00:03.697) 0:00:31.710 ************ included: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [linux-system-roles.vpn : Enable and restart vpn services] ***** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:2 Sunday 12 May 2024 04:41:25 +0000 (0:00:00.024) 0:00:31.735 ************ changed: [sut] => (item=ipsec) => { "ansible_job_id": "824702934399.14687", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/824702934399.14687", "started": 1 } RUNNING HANDLER [linux-system-roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:11 Sunday 12 May 2024 04:41:25 +0000 (0:00:00.384) 0:00:32.119 ************ ok: [sut] => { "changed": false, "elapsed": 3 } META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* sut : ok=72 changed=13 unreachable=0 failed=0 skipped=48 rescued=0 ignored=0 Sunday 12 May 2024 04:41:29 +0000 (0:00:03.538) 0:00:35.658 ************ =============================================================================== fedora.linux_system_roles.selinux : Set an SELinux label on a port ------ 8.26s /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:87 linux-system-roles.vpn : Wait for ssh connection to return -------------- 3.70s /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:11 linux-system-roles.vpn : Wait for ssh connection to return -------------- 3.54s /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:11 fedora.linux_system_roles.selinux : Get SELinux modules facts ----------- 3.23s /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:112 Uninstall packages ------------------------------------------------------ 1.47s /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/cleanup.yml:18 --------------------- fedora.linux_system_roles.firewall : Configure firewall ----------------- 1.01s /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:71 linux-system-roles.vpn : Create ipsec.conf files ------------------------ 0.89s /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:162 linux-system-roles.vpn : Populate service facts ------------------------- 0.81s /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:3 linux-system-roles.vpn : Create ipsec.secrets files --------------------- 0.80s /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:176 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 0.80s /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:28 Get service facts ------------------------------------------------------- 0.76s /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/cleanup.yml:8 ---------------------- Check associated selinux ports when vpn_manage_selinux is true ---------- 0.73s /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/check_firewall_selinux.yml:27 ------ linux-system-roles.vpn : Get the ipsec tcp service ports ---------------- 0.59s /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/selinux.yml:12 Gathering Facts --------------------------------------------------------- 0.56s /WORKDIR/git-weekly-ciglc7xoih/tests/tests_subnet_to_subnet.yml:3 ------------- linux-system-roles.vpn : Ensure required packages are installed --------- 0.45s /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/main.yml:6 Get firewall service ---------------------------------------------------- 0.45s /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/check_firewall_selinux.yml:9 ------- Get associated selinux ports -------------------------------------------- 0.44s /WORKDIR/git-weekly-ciglc7xoih/tests/tasks/check_firewall_selinux.yml:19 ------ linux-system-roles.vpn : Enable and restart vpn services ---------------- 0.44s /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:2 fedora.linux_system_roles.selinux : Refresh facts ----------------------- 0.39s /WORKDIR/git-weekly-ciglc7xoih/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/ensure_selinux_packages.yml:53 linux-system-roles.vpn : Enable and restart vpn services ---------------- 0.38s /WORKDIR/git-weekly-ciglc7xoih/tests/roles/linux-system-roles.vpn/tasks/enable_restart_vpn.yml:2 ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- ---^---^---^---^---^---