# STDOUT: ---v---v---v---v---v--- ansible-playbook [core 2.13.6] config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.13/lib/python3.8/site-packages/ansible ansible collection location = /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection executable location = /opt/ansible-2.13/bin/ansible-playbook python version = 3.8.13 (default, Jun 24 2022, 15:27:57) [GCC 8.5.0 20210514 (Red Hat 8.5.0-13)] jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_subnet_to_subnet.yml ******************************************* 1 plays in /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_subnet_to_subnet.yml PLAY [Test subnet to subnet tunnels] ******************************************* TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_subnet_to_subnet.yml:3 Monday 30 January 2023 09:32:44 +0000 (0:00:00.114) 0:00:00.114 ******** ok: [sut] META: ran handlers TASK [Set up test environment] ************************************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_subnet_to_subnet.yml:17 Monday 30 January 2023 09:32:47 +0000 (0:00:03.618) 0:00:03.733 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml for sut TASK [Set platform/version specific variables] ********************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:2 Monday 30 January 2023 09:32:48 +0000 (0:00:00.312) 0:00:04.045 ******** TASK [fedora.linux_system_roles.vpn : Ensure ansible_facts used by role] ******* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 Monday 30 January 2023 09:32:48 +0000 (0:00:00.290) 0:00:04.336 ******** ok: [sut] TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:7 Monday 30 January 2023 09:32:49 +0000 (0:00:01.380) 0:00:05.716 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=RedHat_8.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/RedHat_8.yml" ], "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.yml" } skipping: [sut] => (item=RedHat_8.8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.8.yml", "skip_reason": "Conditional result was False" } META: role_complete for sut TASK [Change inventory_hostname] *********************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:11 Monday 30 January 2023 09:32:50 +0000 (0:00:00.450) 0:00:06.167 ******** ok: [sut] => { "ansible_facts": { "inventory_hostname": "mainhost.local" }, "changed": false } TASK [Add sample main host] **************************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:17 Monday 30 January 2023 09:32:50 +0000 (0:00:00.317) 0:00:06.485 ******** creating host via 'add_host': hostname=mainhost.local changed: [sut] => { "add_host": { "groups": [], "host_name": "mainhost.local", "host_vars": {} }, "changed": true } TASK [Create nss directory for testing] **************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:21 Monday 30 January 2023 09:32:51 +0000 (0:00:00.573) 0:00:07.058 ******** changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0 } TASK [Create /etc/ipsec.d directory for testing] ******************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:27 Monday 30 January 2023 09:32:53 +0000 (0:00:02.592) 0:00:09.651 ******** ok: [sut] => { "changed": false, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0 } TASK [Dynamically add more hosts] ********************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:33 Monday 30 January 2023 09:32:54 +0000 (0:00:00.772) 0:00:10.423 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/add_hosts.yml for sut TASK [Dynamically add multiple hosts for testing] ****************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/add_hosts.yml:2 Monday 30 January 2023 09:32:55 +0000 (0:00:00.415) 0:00:10.838 ******** creating host via 'add_host': hostname=host01.local changed: [sut] => (item=1) => { "add_host": { "groups": [ "testing" ], "host_name": "host01.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 1 } TASK [Create mock vpn_connections] ********************************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/add_hosts.yml:11 Monday 30 January 2023 09:32:55 +0000 (0:00:00.529) 0:00:11.368 ******** ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "hosts": { "host01.local": "", "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [Create sample policies directory for testing] **************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:39 Monday 30 January 2023 09:32:55 +0000 (0:00:00.283) 0:00:11.651 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:45 Monday 30 January 2023 09:32:56 +0000 (0:00:00.595) 0:00:12.246 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:51 Monday 30 January 2023 09:32:56 +0000 (0:00:00.513) 0:00:12.760 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create sample policy files for testing] ********************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:57 Monday 30 January 2023 09:32:57 +0000 (0:00:00.398) 0:00:13.159 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Add subnets] ************************************************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_subnet_to_subnet.yml:20 Monday 30 January 2023 09:32:57 +0000 (0:00:00.303) 0:00:13.462 ******** ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "hosts": { "host01.local": { "subnets": [ "192.0.2.0/24", "198.51.100.0/24", "203.0.113.0/24" ] }, "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [Use vpn role] ************************************************************ task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_subnet_to_subnet.yml:29 Monday 30 January 2023 09:32:58 +0000 (0:00:00.343) 0:00:13.805 ******** TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:3 Monday 30 January 2023 09:32:58 +0000 (0:00:00.853) 0:00:14.658 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml for sut TASK [fedora.linux_system_roles.vpn : Ensure ansible_facts used by role] ******* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 Monday 30 January 2023 09:32:59 +0000 (0:00:00.443) 0:00:15.102 ******** ok: [sut] TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:7 Monday 30 January 2023 09:33:01 +0000 (0:00:02.128) 0:00:17.231 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=RedHat_8.yml) => { "ansible_facts": { "__vpn_nss_location": "/etc/ipsec.d" }, "ansible_included_var_files": [ "/WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/RedHat_8.yml" ], "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.yml" } skipping: [sut] => (item=RedHat_8.8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.8.yml", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Ensure required packages are installed] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:6 Monday 30 January 2023 09:33:02 +0000 (0:00:00.870) 0:00:18.101 ******** changed: [sut] => { "changed": true, "rc": 0, "results": [ "Installed: libreswan-4.9-1.el8.x86_64", "Installed: ldns-1.7.0-21.el8.x86_64", "Installed: nss-tools-3.79.0-10.el8_6.x86_64" ] } TASK [fedora.linux_system_roles.vpn : Configure firewall] ********************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:12 Monday 30 January 2023 09:33:09 +0000 (0:00:07.377) 0:00:25.479 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/firewall.yml for sut TASK [Ensure the vpn ports status with the firewall role] ********************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/firewall.yml:3 Monday 30 January 2023 09:33:09 +0000 (0:00:00.296) 0:00:25.775 ******** TASK [fedora.linux_system_roles.firewall : Setup firewalld] ******************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:2 Monday 30 January 2023 09:33:10 +0000 (0:00:00.593) 0:00:26.369 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Monday 30 January 2023 09:33:10 +0000 (0:00:00.253) 0:00:26.622 ******** ok: [sut] TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:7 Monday 30 January 2023 09:33:11 +0000 (0:00:00.989) 0:00:27.612 ******** ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do TASK [fedora.linux_system_roles.firewall : Install python-firewall] ************ task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:12 Monday 30 January 2023 09:33:14 +0000 (0:00:02.222) 0:00:29.834 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install python3-firewall] *********** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:18 Monday 30 January 2023 09:33:14 +0000 (0:00:00.412) 0:00:30.247 ******** ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 Monday 30 January 2023 09:33:16 +0000 (0:00:02.173) 0:00:32.421 ******** changed: [sut] => { "changed": true, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "sysinit.target dbus.service polkit.service dbus.socket basic.target system.slice", "AllowIsolate": "no", "AllowedCPUs": "", "AllowedMemoryNodes": "", "AmbientCapabilities": "", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target network-pre.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUAffinity": "", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "ConfigurationDirectoryMode": "0755", "Conflicts": "ip6tables.service shutdown.target nftables.service iptables.service ebtables.service ipset.service", "ControlPID": "0", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "DynamicUser": "no", "EffectiveCPUs": "", "EffectiveMemoryNodes": "", "EnvironmentFiles": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOSchedulingClass": "0", "IOSchedulingPriority": "0", "IOWeight": "[not set]", "IPAccounting": "no", "IPEgressBytes": "18446744073709551615", "IPEgressPackets": "18446744073709551615", "IPIngressBytes": "18446744073709551615", "IPIngressPackets": "18446744073709551615", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "0", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "262144", "LimitNOFILESoft": "1024", "LimitNPROC": "14014", "LimitNPROCSoft": "14014", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14014", "LimitSIGPENDINGSoft": "14014", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "0", "MemoryAccounting": "yes", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemorySwapMax": "infinity", "MountAPIVFS": "no", "MountFlags": "", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAMask": "", "NUMAPolicy": "n/a", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "Perpetual": "no", "PrivateDevices": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "system.slice dbus.socket sysinit.target", "Restart": "no", "RestartUSec": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardInputData": "", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StateChangeTimestampMonotonic": "0", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "[not set]", "TasksMax": "22423", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "UtmpMode": "init", "Wants": "network-pre.target", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:11 Monday 30 January 2023 09:33:21 +0000 (0:00:05.353) 0:00:37.775 ******** ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python3" }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:16 Monday 30 January 2023 09:33:22 +0000 (0:00:00.428) 0:00:38.203 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:38 Monday 30 January 2023 09:33:22 +0000 (0:00:00.296) 0:00:38.500 ******** changed: [sut] => (item={'service': 'ipsec', 'state': 'enabled'}) => { "__firewall_changed": true, "ansible_loop_var": "item", "changed": true, "item": { "service": "ipsec", "state": "enabled" } } TASK [fedora.linux_system_roles.firewall : Gather firewall config information] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:83 Monday 30 January 2023 09:33:25 +0000 (0:00:02.381) 0:00:40.881 ******** skipping: [sut] => (item={'service': 'ipsec', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "service": "ipsec", "state": "enabled" }, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:93 Monday 30 January 2023 09:33:25 +0000 (0:00:00.547) 0:00:41.429 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Gather firewall config if no arguments] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:102 Monday 30 January 2023 09:33:26 +0000 (0:00:00.427) 0:00:41.856 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Update firewalld_config fact] ******* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:107 Monday 30 January 2023 09:33:26 +0000 (0:00:00.423) 0:00:42.279 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:114 Monday 30 January 2023 09:33:26 +0000 (0:00:00.290) 0:00:42.570 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:122 Monday 30 January 2023 09:33:27 +0000 (0:00:00.275) 0:00:42.845 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:128 Monday 30 January 2023 09:33:27 +0000 (0:00:00.335) 0:00:43.181 ******** skipping: [sut] => {} META: role_complete for sut TASK [fedora.linux_system_roles.vpn : Configure selinux] *********************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:15 Monday 30 January 2023 09:33:27 +0000 (0:00:00.327) 0:00:43.508 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml for sut TASK [fedora.linux_system_roles.vpn : Populate service facts] ****************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:3 Monday 30 January 2023 09:33:28 +0000 (0:00:00.453) 0:00:43.962 ******** ok: [sut] => { "ansible_facts": { "services": { "NetworkManager-dispatcher.service": { "name": "NetworkManager-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "NetworkManager-wait-online.service": { "name": "NetworkManager-wait-online.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "NetworkManager.service": { "name": "NetworkManager.service", "source": "systemd", "state": "running", "status": "enabled" }, "auditd.service": { "name": "auditd.service", "source": "systemd", "state": "running", "status": "enabled" }, "auth-rpcgss-module.service": { "name": "auth-rpcgss-module.service", "source": "systemd", "state": "stopped", "status": "static" }, "auto-cpufreq.service": { "name": "auto-cpufreq.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "autovt@.service": { "name": "autovt@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "chrony-dnssrv@.service": { "name": "chrony-dnssrv@.service", "source": "systemd", "state": "unknown", "status": "static" }, "chrony-wait.service": { "name": "chrony-wait.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "chronyd.service": { "name": "chronyd.service", "source": "systemd", "state": "running", "status": "enabled" }, "cloud-config.service": { "name": "cloud-config.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-final.service": { "name": "cloud-final.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init-hotplugd.service": { "name": "cloud-init-hotplugd.service", "source": "systemd", "state": "inactive", "status": "static" }, "cloud-init-local.service": { "name": "cloud-init-local.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "cloud-init.service": { "name": "cloud-init.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "console-getty.service": { "name": "console-getty.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "container-getty@.service": { "name": "container-getty@.service", "source": "systemd", "state": "unknown", "status": "static" }, "cpupower.service": { "name": "cpupower.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "crond.service": { "name": "crond.service", "source": "systemd", "state": "running", "status": "enabled" }, "dbus-org.fedoraproject.FirewallD1.service": { "name": "dbus-org.fedoraproject.FirewallD1.service", "source": "systemd", "state": "active", "status": "enabled" }, "dbus-org.freedesktop.hostname1.service": { "name": "dbus-org.freedesktop.hostname1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.locale1.service": { "name": "dbus-org.freedesktop.locale1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.login1.service": { "name": "dbus-org.freedesktop.login1.service", "source": "systemd", "state": "active", "status": "static" }, "dbus-org.freedesktop.nm-dispatcher.service": { "name": "dbus-org.freedesktop.nm-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus-org.freedesktop.portable1.service": { "name": "dbus-org.freedesktop.portable1.service", "source": "systemd", "state": "inactive", "status": "static" }, "dbus-org.freedesktop.timedate1.service": { "name": "dbus-org.freedesktop.timedate1.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "dbus.service": { "name": "dbus.service", "source": "systemd", "state": "running", "status": "static" }, "dbxtool.service": { "name": "dbxtool.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "debug-shell.service": { "name": "debug-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "display-manager.service": { "name": "display-manager.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "dnf-makecache.service": { "name": "dnf-makecache.service", "source": "systemd", "state": "stopped", "status": "static" }, "dnf-system-upgrade-cleanup.service": { "name": "dnf-system-upgrade-cleanup.service", "source": "systemd", "state": "inactive", "status": "static" }, "dnf-system-upgrade.service": { "name": "dnf-system-upgrade.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "dracut-cmdline.service": { "name": "dracut-cmdline.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-initqueue.service": { "name": "dracut-initqueue.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-mount.service": { "name": "dracut-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-mount.service": { "name": "dracut-pre-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-pivot.service": { "name": "dracut-pre-pivot.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-trigger.service": { "name": "dracut-pre-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-udev.service": { "name": "dracut-pre-udev.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown-onfailure.service": { "name": "dracut-shutdown-onfailure.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown.service": { "name": "dracut-shutdown.service", "source": "systemd", "state": "stopped", "status": "static" }, "ebtables.service": { "name": "ebtables.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "emergency.service": { "name": "emergency.service", "source": "systemd", "state": "stopped", "status": "static" }, "firewalld.service": { "name": "firewalld.service", "source": "systemd", "state": "running", "status": "enabled" }, "fstrim.service": { "name": "fstrim.service", "source": "systemd", "state": "inactive", "status": "static" }, "getty@.service": { "name": "getty@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "getty@tty1.service": { "name": "getty@tty1.service", "source": "systemd", "state": "running", "status": "active" }, "grub-boot-indeterminate.service": { "name": "grub-boot-indeterminate.service", "source": "systemd", "state": "inactive", "status": "static" }, "gssproxy.service": { "name": "gssproxy.service", "source": "systemd", "state": "running", "status": "disabled" }, "halt-local.service": { "name": "halt-local.service", "source": "systemd", "state": "inactive", "status": "static" }, "hv_kvp_daemon.service": { "name": "hv_kvp_daemon.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "import-state.service": { "name": "import-state.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "initrd-cleanup.service": { "name": "initrd-cleanup.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-parse-etc.service": { "name": "initrd-parse-etc.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-switch-root.service": { "name": "initrd-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-udevadm-cleanup-db.service": { "name": "initrd-udevadm-cleanup-db.service", "source": "systemd", "state": "stopped", "status": "static" }, "insights-client-boot.service": { "name": "insights-client-boot.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "insights-client-results.service": { "name": "insights-client-results.service", "source": "systemd", "state": "inactive", "status": "static" }, "insights-client.service": { "name": "insights-client.service", "source": "systemd", "state": "inactive", "status": "static" }, "ip6tables.service": { "name": "ip6tables.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "iprdump.service": { "name": "iprdump.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprinit.service": { "name": "iprinit.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "iprupdate.service": { "name": "iprupdate.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ipsec.service": { "name": "ipsec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ipset.service": { "name": "ipset.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "iptables.service": { "name": "iptables.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "irqbalance.service": { "name": "irqbalance.service", "source": "systemd", "state": "running", "status": "enabled" }, "kdump.service": { "name": "kdump.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "kmod-static-nodes.service": { "name": "kmod-static-nodes.service", "source": "systemd", "state": "stopped", "status": "static" }, "kvm_stat.service": { "name": "kvm_stat.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ldconfig.service": { "name": "ldconfig.service", "source": "systemd", "state": "stopped", "status": "static" }, "loadmodules.service": { "name": "loadmodules.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "man-db-cache-update.service": { "name": "man-db-cache-update.service", "source": "systemd", "state": "inactive", "status": "static" }, "man-db-restart-cache-update.service": { "name": "man-db-restart-cache-update.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "messagebus.service": { "name": "messagebus.service", "source": "systemd", "state": "active", "status": "static" }, "microcode.service": { "name": "microcode.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "network.service": { "name": "network.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "nfs-blkmap.service": { "name": "nfs-blkmap.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-convert.service": { "name": "nfs-convert.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "nfs-idmapd.service": { "name": "nfs-idmapd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-mountd.service": { "name": "nfs-mountd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-server.service": { "name": "nfs-server.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nfs-utils.service": { "name": "nfs-utils.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfsdcld.service": { "name": "nfsdcld.service", "source": "systemd", "state": "stopped", "status": "static" }, "nftables.service": { "name": "nftables.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nis-domainname.service": { "name": "nis-domainname.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "ntpd.service": { "name": "ntpd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ntpdate.service": { "name": "ntpdate.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "oddjobd.service": { "name": "oddjobd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "plymouth-halt.service": { "name": "plymouth-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-kexec.service": { "name": "plymouth-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-poweroff.service": { "name": "plymouth-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-quit-wait.service": { "name": "plymouth-quit-wait.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-quit.service": { "name": "plymouth-quit.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-read-write.service": { "name": "plymouth-read-write.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-reboot.service": { "name": "plymouth-reboot.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-start.service": { "name": "plymouth-start.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-switch-root-initramfs.service": { "name": "plymouth-switch-root-initramfs.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-switch-root.service": { "name": "plymouth-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "polkit.service": { "name": "polkit.service", "source": "systemd", "state": "running", "status": "static" }, "power-profiles-daemon.service": { "name": "power-profiles-daemon.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "qemu-guest-agent.service": { "name": "qemu-guest-agent.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "quotaon.service": { "name": "quotaon.service", "source": "systemd", "state": "inactive", "status": "static" }, "rc-local.service": { "name": "rc-local.service", "source": "systemd", "state": "stopped", "status": "static" }, "rdisc.service": { "name": "rdisc.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rescue.service": { "name": "rescue.service", "source": "systemd", "state": "stopped", "status": "static" }, "restraintd.service": { "name": "restraintd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rhcd.service": { "name": "rhcd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rhsm-facts.service": { "name": "rhsm-facts.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rhsm.service": { "name": "rhsm.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rhsmcertd.service": { "name": "rhsmcertd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rngd.service": { "name": "rngd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpc-gssd.service": { "name": "rpc-gssd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd-notify.service": { "name": "rpc-statd-notify.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd.service": { "name": "rpc-statd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpcbind.service": { "name": "rpcbind.service", "source": "systemd", "state": "running", "status": "enabled" }, "rsyslog.service": { "name": "rsyslog.service", "source": "systemd", "state": "running", "status": "enabled" }, "selinux-autorelabel-mark.service": { "name": "selinux-autorelabel-mark.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "selinux-autorelabel.service": { "name": "selinux-autorelabel.service", "source": "systemd", "state": "inactive", "status": "static" }, "serial-getty@.service": { "name": "serial-getty@.service", "source": "systemd", "state": "unknown", "status": "indirect" }, "serial-getty@ttyS0.service": { "name": "serial-getty@ttyS0.service", "source": "systemd", "state": "running", "status": "active" }, "snapd.seeded.service": { "name": "snapd.seeded.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sntp.service": { "name": "sntp.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sshd-keygen.service": { "name": "sshd-keygen.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sshd-keygen@.service": { "name": "sshd-keygen@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "sshd-keygen@ecdsa.service": { "name": "sshd-keygen@ecdsa.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd-keygen@ed25519.service": { "name": "sshd-keygen@ed25519.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd-keygen@rsa.service": { "name": "sshd-keygen@rsa.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd.service": { "name": "sshd.service", "source": "systemd", "state": "running", "status": "enabled" }, "sshd@.service": { "name": "sshd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "sssd-autofs.service": { "name": "sssd-autofs.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-kcm.service": { "name": "sssd-kcm.service", "source": "systemd", "state": "stopped", "status": "indirect" }, "sssd-nss.service": { "name": "sssd-nss.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-pac.service": { "name": "sssd-pac.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-pam.service": { "name": "sssd-pam.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-ssh.service": { "name": "sssd-ssh.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-sudo.service": { "name": "sssd-sudo.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd.service": { "name": "sssd.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "syslog.service": { "name": "syslog.service", "source": "systemd", "state": "active", "status": "enabled" }, "system-update-cleanup.service": { "name": "system-update-cleanup.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-ask-password-console.service": { "name": "systemd-ask-password-console.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-plymouth.service": { "name": "systemd-ask-password-plymouth.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-wall.service": { "name": "systemd-ask-password-wall.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-backlight@.service": { "name": "systemd-backlight@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-binfmt.service": { "name": "systemd-binfmt.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-coredump@.service": { "name": "systemd-coredump@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-exit.service": { "name": "systemd-exit.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-firstboot.service": { "name": "systemd-firstboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck-root.service": { "name": "systemd-fsck-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck@.service": { "name": "systemd-fsck@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-halt.service": { "name": "systemd-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hibernate-resume@.service": { "name": "systemd-hibernate-resume@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-hibernate.service": { "name": "systemd-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hostnamed.service": { "name": "systemd-hostnamed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hwdb-update.service": { "name": "systemd-hwdb-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-hybrid-sleep.service": { "name": "systemd-hybrid-sleep.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-initctl.service": { "name": "systemd-initctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-catalog-update.service": { "name": "systemd-journal-catalog-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-flush.service": { "name": "systemd-journal-flush.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journald.service": { "name": "systemd-journald.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-kexec.service": { "name": "systemd-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-localed.service": { "name": "systemd-localed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-logind.service": { "name": "systemd-logind.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-machine-id-commit.service": { "name": "systemd-machine-id-commit.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-modules-load.service": { "name": "systemd-modules-load.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-networkd-wait-online.service": { "name": "systemd-networkd-wait-online.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-portabled.service": { "name": "systemd-portabled.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-poweroff.service": { "name": "systemd-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-quotacheck.service": { "name": "systemd-quotacheck.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-random-seed.service": { "name": "systemd-random-seed.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-reboot.service": { "name": "systemd-reboot.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-remount-fs.service": { "name": "systemd-remount-fs.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-resolved.service": { "name": "systemd-resolved.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-rfkill.service": { "name": "systemd-rfkill.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-suspend-then-hibernate.service": { "name": "systemd-suspend-then-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-suspend.service": { "name": "systemd-suspend.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-sysctl.service": { "name": "systemd-sysctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-sysusers.service": { "name": "systemd-sysusers.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-timedated.service": { "name": "systemd-timedated.service", "source": "systemd", "state": "inactive", "status": "masked" }, "systemd-timesyncd.service": { "name": "systemd-timesyncd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "systemd-tmpfiles-clean.service": { "name": "systemd-tmpfiles-clean.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup-dev.service": { "name": "systemd-tmpfiles-setup-dev.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup.service": { "name": "systemd-tmpfiles-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-settle.service": { "name": "systemd-udev-settle.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-udev-trigger.service": { "name": "systemd-udev-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udevd.service": { "name": "systemd-udevd.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-update-done.service": { "name": "systemd-update-done.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp-runlevel.service": { "name": "systemd-update-utmp-runlevel.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp.service": { "name": "systemd-update-utmp.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-user-sessions.service": { "name": "systemd-user-sessions.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-vconsole-setup.service": { "name": "systemd-vconsole-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-volatile-root.service": { "name": "systemd-volatile-root.service", "source": "systemd", "state": "inactive", "status": "static" }, "tcsd.service": { "name": "tcsd.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "teamd@.service": { "name": "teamd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "timedatex.service": { "name": "timedatex.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "tlp.service": { "name": "tlp.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "tuned.service": { "name": "tuned.service", "source": "systemd", "state": "running", "status": "enabled" }, "unbound-anchor.service": { "name": "unbound-anchor.service", "source": "systemd", "state": "stopped", "status": "static" }, "user-runtime-dir@.service": { "name": "user-runtime-dir@.service", "source": "systemd", "state": "unknown", "status": "static" }, "user-runtime-dir@0.service": { "name": "user-runtime-dir@0.service", "source": "systemd", "state": "stopped", "status": "active" }, "user@.service": { "name": "user@.service", "source": "systemd", "state": "unknown", "status": "static" }, "user@0.service": { "name": "user@0.service", "source": "systemd", "state": "running", "status": "active" }, "ypbind.service": { "name": "ypbind.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "yppasswdd.service": { "name": "yppasswdd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ypserv.service": { "name": "ypserv.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ypxfrd.service": { "name": "ypxfrd.service", "source": "systemd", "state": "stopped", "status": "not-found" } } }, "changed": false } TASK [fedora.linux_system_roles.vpn : Get the ipsec tcp service ports] ********* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:12 Monday 30 January 2023 09:33:32 +0000 (0:00:04.001) 0:00:47.964 ******** ok: [sut] => { "changed": false, "cmd": "set -euo pipefail\nfirewall-cmd --info-service=ipsec | egrep \"^ +ports: +\" | sed -e \"s/ *ports: //\"", "delta": "0:00:00.400849", "end": "2023-01-30 09:33:34.671317", "rc": 0, "start": "2023-01-30 09:33:34.270468" } STDOUT: 500/udp 4500/udp 4500/tcp TASK [fedora.linux_system_roles.vpn : Initialize _vpn_selinux] ***************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:20 Monday 30 January 2023 09:33:34 +0000 (0:00:02.598) 0:00:50.563 ******** ok: [sut] => { "ansible_facts": { "_vpn_selinux": [] }, "changed": false } TASK [fedora.linux_system_roles.vpn : Add the ipsec service ports to _vpn_selinux] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:24 Monday 30 January 2023 09:33:35 +0000 (0:00:00.525) 0:00:51.088 ******** ok: [sut] => (item=500/udp) => { "ansible_facts": { "_vpn_selinux": [ { "local": true, "ports": "500", "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" } ] }, "ansible_loop_var": "item", "changed": false, "item": "500/udp" } ok: [sut] => (item=4500/udp) => { "ansible_facts": { "_vpn_selinux": [ { "local": true, "ports": "500", "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" }, { "local": true, "ports": "4500", "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" } ] }, "ansible_loop_var": "item", "changed": false, "item": "4500/udp" } ok: [sut] => (item=4500/tcp) => { "ansible_facts": { "_vpn_selinux": [ { "local": true, "ports": "500", "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" }, { "local": true, "ports": "4500", "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" }, { "local": true, "ports": "4500", "proto": "tcp", "setype": "ipsecnat_port_t", "state": "present" } ] }, "ansible_loop_var": "item", "changed": false, "item": "4500/tcp" } TASK [Ensure the service and the ports status with the selinux role] *********** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:31 Monday 30 January 2023 09:33:36 +0000 (0:00:01.090) 0:00:52.179 ******** redirecting (type: modules) ansible.builtin.selinux to ansible.posix.selinux redirecting (type: modules) ansible.builtin.selinux to ansible.posix.selinux redirecting (type: modules) ansible.builtin.seboolean to ansible.posix.seboolean redirecting (type: modules) ansible.builtin.sefcontext to community.general.sefcontext redirecting (type: modules) ansible.builtin.selogin to community.general.selogin TASK [fedora.linux_system_roles.selinux : Set ansible_facts required by role and install packages] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:2 Monday 30 January 2023 09:33:37 +0000 (0:00:01.562) 0:00:53.742 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/set_facts_packages.yml for sut TASK [fedora.linux_system_roles.selinux : Ensure ansible_facts used by role] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/set_facts_packages.yml:2 Monday 30 January 2023 09:33:38 +0000 (0:00:01.037) 0:00:54.780 ******** ok: [sut] TASK [fedora.linux_system_roles.selinux : Install SELinux python2 tools] ******* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/set_facts_packages.yml:7 Monday 30 January 2023 09:33:40 +0000 (0:00:01.215) 0:00:56.036 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Install SELinux python3 tools] ******* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/set_facts_packages.yml:15 Monday 30 January 2023 09:33:40 +0000 (0:00:00.418) 0:00:56.455 ******** ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do TASK [fedora.linux_system_roles.selinux : Refresh facts] *********************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/set_facts_packages.yml:23 Monday 30 January 2023 09:33:43 +0000 (0:00:03.035) 0:00:59.507 ******** ok: [sut] TASK [fedora.linux_system_roles.selinux : Install SELinux tool semanage] ******* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/set_facts_packages.yml:28 Monday 30 January 2023 09:33:45 +0000 (0:00:01.403) 0:01:00.911 ******** changed: [sut] => { "changed": true, "rc": 0, "results": [ "Installed: policycoreutils-python-utils-2.9-21.1.el8.noarch" ] } TASK [fedora.linux_system_roles.selinux : Set permanent SELinux state if enabled] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:5 Monday 30 January 2023 09:33:48 +0000 (0:00:03.288) 0:01:04.199 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Set permanent SELinux state if disabled] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:13 Monday 30 January 2023 09:33:48 +0000 (0:00:00.581) 0:01:04.780 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Set selinux_reboot_required] ********* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:21 Monday 30 January 2023 09:33:49 +0000 (0:00:00.523) 0:01:05.304 ******** ok: [sut] => { "ansible_facts": { "selinux_reboot_required": false }, "changed": false } TASK [fedora.linux_system_roles.selinux : Fail if reboot is required] ********** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:25 Monday 30 January 2023 09:33:50 +0000 (0:00:00.822) 0:01:06.126 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Warn if SELinux is disabled] ********* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:30 Monday 30 January 2023 09:33:50 +0000 (0:00:00.549) 0:01:06.675 ******** skipping: [sut] => {} TASK [fedora.linux_system_roles.selinux : Drop all local modifications] ******** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:35 Monday 30 January 2023 09:33:51 +0000 (0:00:00.546) 0:01:07.222 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Purge all SELinux boolean local modifications] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:42 Monday 30 January 2023 09:33:52 +0000 (0:00:00.878) 0:01:08.101 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Purge all SELinux file context local modifications] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:46 Monday 30 January 2023 09:33:52 +0000 (0:00:00.411) 0:01:08.512 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Purge all SELinux port local modifications] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:50 Monday 30 January 2023 09:33:53 +0000 (0:00:00.457) 0:01:08.970 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Purge all SELinux login local modifications] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:54 Monday 30 January 2023 09:33:53 +0000 (0:00:00.444) 0:01:09.414 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.selinux : Set SELinux booleans] **************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:58 Monday 30 January 2023 09:33:54 +0000 (0:00:00.390) 0:01:09.805 ******** TASK [fedora.linux_system_roles.selinux : Set SELinux file contexts] *********** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:66 Monday 30 January 2023 09:33:54 +0000 (0:00:00.291) 0:01:10.096 ******** TASK [fedora.linux_system_roles.selinux : Restore SELinux labels on filesystem tree] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:76 Monday 30 January 2023 09:33:54 +0000 (0:00:00.306) 0:01:10.403 ******** TASK [fedora.linux_system_roles.selinux : Restore SELinux labels on filesystem tree in check mode] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:82 Monday 30 January 2023 09:33:54 +0000 (0:00:00.315) 0:01:10.718 ******** TASK [fedora.linux_system_roles.selinux : Set an SELinux label on a port] ****** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:90 Monday 30 January 2023 09:33:55 +0000 (0:00:00.413) 0:01:11.131 ******** changed: [sut] => (item={'ports': '500', 'proto': 'udp', 'setype': 'ipsecnat_port_t', 'state': 'present', 'local': True}) => { "ansible_loop_var": "item", "changed": true, "item": { "local": true, "ports": "500", "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" }, "ports": [ "500" ], "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" } changed: [sut] => (item={'ports': '4500', 'proto': 'udp', 'setype': 'ipsecnat_port_t', 'state': 'present', 'local': True}) => { "ansible_loop_var": "item", "changed": true, "item": { "local": true, "ports": "4500", "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" }, "ports": [ "4500" ], "proto": "udp", "setype": "ipsecnat_port_t", "state": "present" } changed: [sut] => (item={'ports': '4500', 'proto': 'tcp', 'setype': 'ipsecnat_port_t', 'state': 'present', 'local': True}) => { "ansible_loop_var": "item", "changed": true, "item": { "local": true, "ports": "4500", "proto": "tcp", "setype": "ipsecnat_port_t", "state": "present" }, "ports": [ "4500" ], "proto": "tcp", "setype": "ipsecnat_port_t", "state": "present" } TASK [fedora.linux_system_roles.selinux : Set linux user to SELinux user mapping] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:99 Monday 30 January 2023 09:34:10 +0000 (0:00:14.802) 0:01:25.934 ******** TASK [fedora.linux_system_roles.selinux : Get SELinux modules facts] *********** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:109 Monday 30 January 2023 09:34:10 +0000 (0:00:00.532) 0:01:26.466 ******** ok: [sut] => { "ansible_facts": { "selinux_installed_modules": { "abrt": { "100": "enabled" }, "accountsd": { "100": "enabled" }, "acct": { "100": "enabled" }, "afs": { "100": "enabled" }, "aiccu": { "100": "enabled" }, "aide": { "100": "enabled" }, "ajaxterm": { "100": "enabled" }, "alsa": { "100": "enabled" }, "amanda": { "100": "enabled" }, "amtu": { "100": "enabled" }, "anaconda": { "100": "enabled" }, "antivirus": { "100": "enabled" }, "apache": { "100": "enabled" }, "apcupsd": { "100": "enabled" }, "apm": { "100": "enabled" }, "application": { "100": "enabled" }, "arpwatch": { "100": "enabled" }, "asterisk": { "100": "enabled" }, "auditadm": { "100": "enabled" }, "authconfig": { "100": "enabled" }, "authlogin": { "100": "enabled" }, "automount": { "100": "enabled" }, "avahi": { "100": "enabled" }, "awstats": { "100": "enabled" }, "bacula": { "100": "enabled" }, "base": { "100": "enabled" }, "bcfg2": { "100": "enabled" }, "bind": { "100": "enabled" }, "bitlbee": { "100": "enabled" }, "blkmapd": { "100": "enabled" }, "blueman": { "100": "enabled" }, "bluetooth": { "100": "enabled" }, "boinc": { "100": "enabled" }, "boltd": { "100": "enabled" }, "bootloader": { "100": "enabled" }, "brctl": { "100": "enabled" }, "brltty": { "100": "enabled" }, "bugzilla": { "100": "enabled" }, "bumblebee": { "100": "enabled" }, "cachefilesd": { "100": "enabled" }, "calamaris": { "100": "enabled" }, "callweaver": { "100": "enabled" }, "canna": { "100": "enabled" }, "ccs": { "100": "enabled" }, "cdrecord": { "100": "enabled" }, "certmaster": { "100": "enabled" }, "certmonger": { "100": "enabled" }, "certwatch": { "100": "enabled" }, "cfengine": { "100": "enabled" }, "cgdcbxd": { "100": "enabled" }, "cgroup": { "100": "enabled" }, "chrome": { "100": "enabled" }, "chronyd": { "100": "enabled" }, "cinder": { "100": "enabled" }, "cipe": { "100": "enabled" }, "clock": { "100": "enabled" }, "clogd": { "100": "enabled" }, "cloudform": { "100": "enabled" }, "cmirrord": { "100": "enabled" }, "cobbler": { "100": "enabled" }, "cockpit": { "100": "enabled" }, "collectd": { "100": "enabled" }, "colord": { "100": "enabled" }, "comsat": { "100": "enabled" }, "condor": { "100": "enabled" }, "conman": { "100": "enabled" }, "conntrackd": { "100": "enabled" }, "consolekit": { "100": "enabled" }, "couchdb": { "100": "enabled" }, "courier": { "100": "enabled" }, "cpucontrol": { "100": "enabled" }, "cpufreqselector": { "100": "enabled" }, "cpuplug": { "100": "enabled" }, "cron": { "100": "enabled" }, "ctdb": { "100": "enabled" }, "cups": { "100": "enabled" }, "cvs": { "100": "enabled" }, "cyphesis": { "100": "enabled" }, "cyrus": { "100": "enabled" }, "daemontools": { "100": "enabled" }, "dbadm": { "100": "enabled" }, "dbskk": { "100": "enabled" }, "dbus": { "100": "enabled" }, "dcc": { "100": "enabled" }, "ddclient": { "100": "enabled" }, "denyhosts": { "100": "enabled" }, "devicekit": { "100": "enabled" }, "dhcp": { "100": "enabled" }, "dictd": { "100": "enabled" }, "dirsrv": { "100": "enabled" }, "dirsrv-admin": { "100": "enabled" }, "dmesg": { "100": "enabled" }, "dmidecode": { "100": "enabled" }, "dnsmasq": { "100": "enabled" }, "dnssec": { "100": "enabled" }, "dovecot": { "100": "enabled" }, "drbd": { "100": "enabled" }, "dspam": { "100": "enabled" }, "entropyd": { "100": "enabled" }, "exim": { "100": "enabled" }, "fail2ban": { "100": "enabled" }, "fcoe": { "100": "enabled" }, "fetchmail": { "100": "enabled" }, "finger": { "100": "enabled" }, "firewalld": { "100": "enabled" }, "firewallgui": { "100": "enabled" }, "firstboot": { "100": "enabled" }, "fprintd": { "100": "enabled" }, "freeipmi": { "100": "enabled" }, "freqset": { "100": "enabled" }, "fstools": { "100": "enabled" }, "ftp": { "100": "enabled" }, "fwupd": { "100": "enabled" }, "games": { "100": "enabled" }, "gdomap": { "100": "enabled" }, "geoclue": { "100": "enabled" }, "getty": { "100": "enabled" }, "git": { "100": "enabled" }, "gitosis": { "100": "enabled" }, "glance": { "100": "enabled" }, "gnome": { "100": "enabled" }, "gpg": { "100": "enabled" }, "gpm": { "100": "enabled" }, "gpsd": { "100": "enabled" }, "gssproxy": { "100": "enabled" }, "guest": { "100": "enabled" }, "hddtemp": { "100": "enabled" }, "hostapd": { "100": "enabled" }, "hostname": { "100": "enabled" }, "hsqldb": { "100": "enabled" }, "hwloc": { "100": "enabled" }, "hypervkvp": { "100": "enabled" }, "ibacm": { "100": "enabled" }, "icecast": { "100": "enabled" }, "inetd": { "100": "enabled" }, "init": { "100": "enabled" }, "inn": { "100": "enabled" }, "insights_client": { "100": "enabled" }, "iodine": { "100": "enabled" }, "iotop": { "100": "enabled" }, "ipmievd": { "100": "enabled" }, "ipsec": { "100": "enabled" }, "iptables": { "100": "enabled" }, "irc": { "100": "enabled" }, "irqbalance": { "100": "enabled" }, "iscsi": { "100": "enabled" }, "isns": { "100": "enabled" }, "jabber": { "100": "enabled" }, "jetty": { "100": "enabled" }, "jockey": { "100": "enabled" }, "journalctl": { "100": "enabled" }, "kdbus": { "100": "enabled" }, "kdump": { "100": "enabled" }, "kdumpgui": { "100": "enabled" }, "keepalived": { "100": "enabled" }, "kerberos": { "100": "enabled" }, "keyboardd": { "100": "enabled" }, "keystone": { "100": "enabled" }, "kismet": { "100": "enabled" }, "kmscon": { "100": "enabled" }, "kpatch": { "100": "enabled" }, "ksmtuned": { "100": "enabled" }, "ktalk": { "100": "enabled" }, "l2tp": { "100": "enabled" }, "ldap": { "100": "enabled" }, "libraries": { "100": "enabled" }, "likewise": { "100": "enabled" }, "linuxptp": { "100": "enabled" }, "lircd": { "100": "enabled" }, "livecd": { "100": "enabled" }, "lldpad": { "100": "enabled" }, "loadkeys": { "100": "enabled" }, "locallogin": { "100": "enabled" }, "lockdev": { "100": "enabled" }, "logadm": { "100": "enabled" }, "logging": { "100": "enabled" }, "logrotate": { "100": "enabled" }, "logwatch": { "100": "enabled" }, "lpd": { "100": "enabled" }, "lsm": { "100": "enabled" }, "lttng-tools": { "100": "enabled" }, "lvm": { "100": "enabled" }, "mailman": { "100": "enabled" }, "mailscanner": { "100": "enabled" }, "man2html": { "100": "enabled" }, "mandb": { "100": "enabled" }, "mcelog": { "100": "enabled" }, "mediawiki": { "100": "enabled" }, "memcached": { "100": "enabled" }, "milter": { "100": "enabled" }, "minidlna": { "100": "enabled" }, "minissdpd": { "100": "enabled" }, "mip6d": { "100": "enabled" }, "mirrormanager": { "100": "enabled" }, "miscfiles": { "100": "enabled" }, "mock": { "100": "enabled" }, "modemmanager": { "100": "enabled" }, "modutils": { "100": "enabled" }, "mojomojo": { "100": "enabled" }, "mon_statd": { "100": "enabled" }, "mongodb": { "100": "enabled" }, "motion": { "100": "enabled" }, "mount": { "100": "enabled" }, "mozilla": { "100": "enabled" }, "mpd": { "100": "enabled" }, "mplayer": { "100": "enabled" }, "mrtg": { "100": "enabled" }, "mta": { "100": "enabled" }, "munin": { "100": "enabled" }, "mysql": { "100": "enabled" }, "mythtv": { "100": "enabled" }, "naemon": { "100": "enabled" }, "nagios": { "100": "enabled" }, "namespace": { "100": "enabled" }, "ncftool": { "100": "enabled" }, "netlabel": { "100": "enabled" }, "netutils": { "100": "enabled" }, "networkmanager": { "100": "enabled" }, "ninfod": { "100": "enabled" }, "nis": { "100": "enabled" }, "nova": { "100": "enabled" }, "nscd": { "100": "enabled" }, "nsd": { "100": "enabled" }, "nslcd": { "100": "enabled" }, "ntop": { "100": "enabled" }, "ntp": { "100": "enabled" }, "numad": { "100": "enabled" }, "nut": { "100": "enabled" }, "nx": { "100": "enabled" }, "obex": { "100": "enabled" }, "oddjob": { "100": "enabled" }, "opafm": { "100": "enabled" }, "openct": { "100": "enabled" }, "opendnssec": { "100": "enabled" }, "openfortivpn": { "100": "enabled" }, "openhpid": { "100": "enabled" }, "openshift": { "100": "enabled" }, "openshift-origin": { "100": "enabled" }, "opensm": { "100": "enabled" }, "openvpn": { "100": "enabled" }, "openvswitch": { "100": "enabled" }, "openwsman": { "100": "enabled" }, "oracleasm": { "100": "enabled" }, "osad": { "100": "enabled" }, "pads": { "100": "enabled" }, "passenger": { "100": "enabled" }, "pcmcia": { "100": "enabled" }, "pcp": { "100": "enabled" }, "pcscd": { "100": "enabled" }, "pdns": { "100": "enabled" }, "pegasus": { "100": "enabled" }, "permissive_insights_client_t": { "400": "enabled" }, "permissivedomains": { "100": "enabled" }, "pesign": { "100": "enabled" }, "pingd": { "100": "enabled" }, "piranha": { "100": "enabled" }, "pkcs": { "100": "enabled" }, "pkcs11proxyd": { "100": "enabled" }, "pki": { "100": "enabled" }, "plymouthd": { "100": "enabled" }, "podsleuth": { "100": "enabled" }, "policykit": { "100": "enabled" }, "polipo": { "100": "enabled" }, "portmap": { "100": "enabled" }, "portreserve": { "100": "enabled" }, "postfix": { "100": "enabled" }, "postgresql": { "100": "enabled" }, "postgrey": { "100": "enabled" }, "ppp": { "100": "enabled" }, "prelink": { "100": "enabled" }, "prelude": { "100": "enabled" }, "privoxy": { "100": "enabled" }, "procmail": { "100": "enabled" }, "prosody": { "100": "enabled" }, "psad": { "100": "enabled" }, "ptchown": { "100": "enabled" }, "publicfile": { "100": "enabled" }, "pulseaudio": { "100": "enabled" }, "puppet": { "100": "enabled" }, "pwauth": { "100": "enabled" }, "qmail": { "100": "enabled" }, "qpid": { "100": "enabled" }, "quantum": { "100": "enabled" }, "quota": { "100": "enabled" }, "rabbitmq": { "100": "enabled" }, "radius": { "100": "enabled" }, "radvd": { "100": "enabled" }, "raid": { "100": "enabled" }, "rasdaemon": { "100": "enabled" }, "rdisc": { "100": "enabled" }, "readahead": { "100": "enabled" }, "realmd": { "100": "enabled" }, "redis": { "100": "enabled" }, "remotelogin": { "100": "enabled" }, "restraint": { "400": "enabled" }, "rhcs": { "100": "enabled" }, "rhev": { "100": "enabled" }, "rhgb": { "100": "enabled" }, "rhnsd": { "100": "enabled" }, "rhsmcertd": { "100": "enabled" }, "rhts": { "400": "enabled" }, "ricci": { "100": "enabled" }, "rkhunter": { "100": "enabled" }, "rkt": { "100": "enabled" }, "rlogin": { "100": "enabled" }, "rngd": { "100": "enabled" }, "rolekit": { "100": "enabled" }, "roundup": { "100": "enabled" }, "rpc": { "100": "enabled" }, "rpcbind": { "100": "enabled" }, "rpm": { "100": "enabled" }, "rrdcached": { "100": "enabled" }, "rshd": { "100": "enabled" }, "rssh": { "100": "enabled" }, "rsync": { "100": "enabled" }, "rtas": { "100": "enabled" }, "rtkit": { "100": "enabled" }, "rwho": { "100": "enabled" }, "samba": { "100": "enabled" }, "sambagui": { "100": "enabled" }, "sandboxX": { "100": "enabled" }, "sanlock": { "100": "enabled" }, "sasl": { "100": "enabled" }, "sbd": { "100": "enabled" }, "sblim": { "100": "enabled" }, "screen": { "100": "enabled" }, "secadm": { "100": "enabled" }, "sectoolm": { "100": "enabled" }, "selinuxutil": { "100": "enabled" }, "sendmail": { "100": "enabled" }, "sensord": { "100": "enabled" }, "setrans": { "100": "enabled" }, "setroubleshoot": { "100": "enabled" }, "seunshare": { "100": "enabled" }, "sge": { "100": "enabled" }, "shorewall": { "100": "enabled" }, "slocate": { "100": "enabled" }, "slpd": { "100": "enabled" }, "smartmon": { "100": "enabled" }, "smokeping": { "100": "enabled" }, "smoltclient": { "100": "enabled" }, "smsd": { "100": "enabled" }, "snapper": { "100": "enabled" }, "snmp": { "100": "enabled" }, "snort": { "100": "enabled" }, "sosreport": { "100": "enabled" }, "soundserver": { "100": "enabled" }, "spamassassin": { "100": "enabled" }, "speech-dispatcher": { "100": "enabled" }, "squid": { "100": "enabled" }, "ssh": { "100": "enabled" }, "sslh": { "100": "enabled" }, "sssd": { "100": "enabled" }, "staff": { "100": "enabled" }, "stapserver": { "100": "enabled" }, "stratisd": { "100": "enabled" }, "stunnel": { "100": "enabled" }, "su": { "100": "enabled" }, "sudo": { "100": "enabled" }, "svnserve": { "100": "enabled" }, "swift": { "100": "enabled" }, "sysadm": { "100": "enabled" }, "sysadm_secadm": { "100": "enabled" }, "sysnetwork": { "100": "enabled" }, "sysstat": { "100": "enabled" }, "systemd": { "100": "enabled" }, "tangd": { "100": "enabled" }, "targetd": { "100": "enabled" }, "tcpd": { "100": "enabled" }, "tcsd": { "100": "enabled" }, "telepathy": { "100": "enabled" }, "telnet": { "100": "enabled" }, "tftp": { "100": "enabled" }, "tgtd": { "100": "enabled" }, "thin": { "100": "enabled" }, "thumb": { "100": "enabled" }, "timedatex": { "100": "enabled" }, "tlp": { "100": "enabled" }, "tmpreaper": { "100": "enabled" }, "tomcat": { "100": "enabled" }, "tor": { "100": "enabled" }, "tuned": { "100": "enabled" }, "tvtime": { "100": "enabled" }, "udev": { "100": "enabled" }, "ulogd": { "100": "enabled" }, "uml": { "100": "enabled" }, "unconfined": { "100": "enabled" }, "unconfineduser": { "100": "enabled" }, "unlabelednet": { "100": "enabled" }, "unprivuser": { "100": "enabled" }, "updfstab": { "100": "enabled" }, "usbmodules": { "100": "enabled" }, "usbmuxd": { "100": "enabled" }, "userdomain": { "100": "enabled" }, "userhelper": { "100": "enabled" }, "usermanage": { "100": "enabled" }, "usernetctl": { "100": "enabled" }, "uucp": { "100": "enabled" }, "uuidd": { "100": "enabled" }, "varnishd": { "100": "enabled" }, "vdagent": { "100": "enabled" }, "vhostmd": { "100": "enabled" }, "virt": { "100": "enabled" }, "vlock": { "100": "enabled" }, "vmtools": { "100": "enabled" }, "vmware": { "100": "enabled" }, "vnstatd": { "100": "enabled" }, "vpn": { "100": "enabled" }, "w3c": { "100": "enabled" }, "watchdog": { "100": "enabled" }, "wdmd": { "100": "enabled" }, "webadm": { "100": "enabled" }, "webalizer": { "100": "enabled" }, "wine": { "100": "enabled" }, "wireshark": { "100": "enabled" }, "xen": { "100": "enabled" }, "xguest": { "100": "enabled" }, "xserver": { "100": "enabled" }, "zabbix": { "100": "enabled" }, "zarafa": { "100": "enabled" }, "zebra": { "100": "enabled" }, "zoneminder": { "100": "enabled" }, "zosremote": { "100": "enabled" } }, "selinux_priorities": true }, "changed": false } TASK [fedora.linux_system_roles.selinux : Load SELinux modules] **************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:112 Monday 30 January 2023 09:34:13 +0000 (0:00:02.770) 0:01:29.237 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } META: role_complete for sut TASK [fedora.linux_system_roles.vpn : Ensure OpenSSL is installed on the controller] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:25 Monday 30 January 2023 09:34:14 +0000 (0:00:00.765) 0:01:30.003 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Enforce default auth method as needed] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:33 Monday 30 January 2023 09:34:14 +0000 (0:00:00.473) 0:01:30.476 ******** ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "psk", "hosts": { "host01.local": { "subnets": [ "192.0.2.0/24", "198.51.100.0/24", "203.0.113.0/24" ] }, "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [fedora.linux_system_roles.vpn : Make sure that the hosts list is not empty] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:43 Monday 30 January 2023 09:34:15 +0000 (0:00:00.534) 0:01:31.011 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Make sure there is at least one pair of hosts in each connection] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:58 Monday 30 January 2023 09:34:15 +0000 (0:00:00.586) 0:01:31.597 ******** ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "psk", "hosts": { "host01.local": { "subnets": [ "192.0.2.0/24", "198.51.100.0/24", "203.0.113.0/24" ] }, "mainhost.local": "", "sut": "" } } ] }, "changed": false } TASK [fedora.linux_system_roles.vpn : Ensure cert_names are populated when auth_method is cert] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:72 Monday 30 January 2023 09:34:16 +0000 (0:00:00.566) 0:01:32.164 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Generate PSKs or use provided shared_key_content] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:99 Monday 30 January 2023 09:34:17 +0000 (0:00:00.723) 0:01:32.887 ******** ok: [sut -> localhost] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [fedora.linux_system_roles.vpn : Set psks for hosts] ********************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:136 Monday 30 January 2023 09:34:17 +0000 (0:00:00.831) 0:01:33.718 ******** ok: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [fedora.linux_system_roles.vpn : Create ipsec.conf files] ***************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:160 Monday 30 January 2023 09:34:19 +0000 (0:00:01.881) 0:01:35.600 ******** changed: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": true, "checksum": "bf0bdb469d33ad69b4da60a67929818f3066569c", "dest": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "gid": 0, "group": "root", "item": "host01.local", "md5sum": "a0bf41801579dde9f74deed6f762278c", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 242, "src": "/root/.ansible/tmp/ansible-tmp-1675071260.232144-7892-201621141775805/source", "state": "file", "uid": 0 } changed: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": true, "checksum": "1c84cf6fadebb8ee360eb028f8f9e3de9419878b", "dest": "/etc/ipsec.d/mainhost.local-to-sut.conf", "gid": 0, "group": "root", "item": "sut", "md5sum": "ae46e1850ac0d1249587310444062f0e", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 177, "src": "/root/.ansible/tmp/ansible-tmp-1675071266.9508557-7892-30259408807304/source", "state": "file", "uid": 0 } NOTIFIED HANDLER fedora.linux_system_roles.vpn : Restart vpn service and wait for ssh conn to return for sut NOTIFIED HANDLER fedora.linux_system_roles.vpn : Restart vpn service and wait for ssh conn to return for sut TASK [fedora.linux_system_roles.vpn : Check if secrets file already exists] **** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:168 Monday 30 January 2023 09:34:29 +0000 (0:00:09.204) 0:01:44.804 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "exists": false } } ok: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": false, "item": "sut", "stat": { "exists": false } } TASK [fedora.linux_system_roles.vpn : Create ipsec.secrets files] ************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:174 Monday 30 January 2023 09:34:30 +0000 (0:00:01.372) 0:01:46.177 ******** changed: [sut] => (item={'changed': False, 'stat': {'exists': False}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "7066c5a4af7d9308497baf22fffbe0f7ee8cbfc7", "dest": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "stat": { "exists": false } }, "md5sum": "3f8b135280975767770477f2ac604665", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 125, "src": "/root/.ansible/tmp/ansible-tmp-1675071270.7864015-7951-43066829025026/source", "state": "file", "uid": 0 } changed: [sut] => (item={'changed': False, 'stat': {'exists': False}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-sut.secrets', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'sut', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": true, "checksum": "b69ddbe7047d876ca787adbeafe8725283eaad94", "dest": "/etc/ipsec.d/mainhost.local-to-sut.secrets", "gid": 0, "group": "root", "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-sut.secrets" } }, "item": "sut", "stat": { "exists": false } }, "md5sum": "205222737b59c9aa5a7c9e2010fe5f7c", "mode": "0600", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 123, "src": "/root/.ansible/tmp/ansible-tmp-1675071273.1620257-7951-49898287172990/source", "state": "file", "uid": 0 } TASK [fedora.linux_system_roles.vpn : Build opportunistic configuration] ******* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:184 Monday 30 January 2023 09:34:35 +0000 (0:00:04.741) 0:01:50.919 ******** skipping: [sut] => (item=None) => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } skipping: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } META: role_complete for sut TASK [Assert file existence] *************************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_subnet_to_subnet.yml:34 Monday 30 January 2023 09:34:35 +0000 (0:00:00.808) 0:01:51.727 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/assert_conf_secrets_files_exist.yml for sut TASK [Stat conf files paths] *************************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/assert_conf_secrets_files_exist.yml:2 Monday 30 January 2023 09:34:36 +0000 (0:00:00.456) 0:01:52.184 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "atime": 1675071266.446864, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "bf0bdb469d33ad69b4da60a67929818f3066569c", "ctime": 1675071266.451864, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 813695191, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1675071263.9568183, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 242, "uid": 0, "version": "2773705685", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Stat secrets files paths] ************************************************ task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/assert_conf_secrets_files_exist.yml:8 Monday 30 January 2023 09:34:37 +0000 (0:00:00.761) 0:01:52.946 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "item": "host01.local", "stat": { "atime": 1675071272.618977, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "7066c5a4af7d9308497baf22fffbe0f7ee8cbfc7", "ctime": 1675071272.6279771, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 33555025, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1675071272.0659668, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 125, "uid": 0, "version": "3186350478", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Assert that ipsec.conf and secrets files exist] ************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/assert_conf_secrets_files_exist.yml:14 Monday 30 January 2023 09:34:37 +0000 (0:00:00.804) 0:01:53.750 ******** ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'mode': '0644', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 242, 'inode': 813695191, 'dev': 51715, 'nlink': 1, 'atime': 1675071266.446864, 'mtime': 1675071263.9568183, 'ctime': 1675071266.451864, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': True, 'xgrp': False, 'woth': False, 'roth': True, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': 'bf0bdb469d33ad69b4da60a67929818f3066569c', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '2773705685', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } }, "item": "host01.local", "stat": { "atime": 1675071266.446864, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "bf0bdb469d33ad69b4da60a67929818f3066569c", "ctime": 1675071266.451864, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 813695191, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1675071263.9568183, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 242, "uid": 0, "version": "2773705685", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed TASK [Assert that ipsec.conf and secrets files exist] ************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/assert_conf_secrets_files_exist.yml:20 Monday 30 January 2023 09:34:38 +0000 (0:00:00.604) 0:01:54.354 ******** ok: [sut] => (item={'changed': False, 'stat': {'exists': True, 'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'mode': '0600', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 0, 'gid': 0, 'size': 125, 'inode': 33555025, 'dev': 51715, 'nlink': 1, 'atime': 1675071272.618977, 'mtime': 1675071272.0659668, 'ctime': 1675071272.6279771, 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': False, 'xgrp': False, 'woth': False, 'roth': False, 'xoth': False, 'isuid': False, 'isgid': False, 'blocks': 8, 'block_size': 4096, 'device_type': 0, 'readable': True, 'writeable': True, 'executable': False, 'pw_name': 'root', 'gr_name': 'root', 'checksum': '7066c5a4af7d9308497baf22fffbe0f7ee8cbfc7', 'mimetype': 'text/plain', 'charset': 'us-ascii', 'version': '3186350478', 'attributes': [], 'attr_flags': ''}, 'invocation': {'module_args': {'path': '/etc/ipsec.d/mainhost.local-to-host01.local.secrets', 'follow': False, 'get_md5': False, 'get_checksum': True, 'get_mime': True, 'get_attributes': True, 'checksum_algorithm': 'sha1'}}, 'failed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ansible_loop_var": "item", "changed": false, "failed": false, "invocation": { "module_args": { "checksum_algorithm": "sha1", "follow": false, "get_attributes": true, "get_checksum": true, "get_md5": false, "get_mime": true, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets" } }, "item": "host01.local", "stat": { "atime": 1675071272.618977, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "7066c5a4af7d9308497baf22fffbe0f7ee8cbfc7", "ctime": 1675071272.6279771, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 33555025, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1675071272.0659668, "nlink": 1, "path": "/etc/ipsec.d/mainhost.local-to-host01.local.secrets", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 125, "uid": 0, "version": "3186350478", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } } MSG: All assertions passed TASK [Reset success flag] ****************************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_subnet_to_subnet.yml:37 Monday 30 January 2023 09:34:38 +0000 (0:00:00.321) 0:01:54.676 ******** ok: [sut] => { "ansible_facts": { "__vpn_success": true }, "changed": false } TASK [Get and store conf files] ************************************************ task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_subnet_to_subnet.yml:41 Monday 30 January 2023 09:34:39 +0000 (0:00:00.227) 0:01:54.903 ******** ok: [sut] => (item=host01.local) => { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCmNvbm4gbWFpbmhvc3QubG9jYWwtdG8taG9zdDAxLmxvY2FsCiAgbGVmdD1tYWluaG9zdC5sb2NhbAogIGxlZnRpZD1AbWFpbmhvc3QubG9jYWwKICByaWdodD1ob3N0MDEubG9jYWwKICByaWdodGlkPUBob3N0MDEubG9jYWwKICByaWdodHN1Ym5ldHM9ezE5Mi4wLjIuMC8yNCwxOTguNTEuMTAwLjAvMjQsMjAzLjAuMTEzLjAvMjR9CiAgaWtldjI9aW5zaXN0CiAgYXV0aGJ5PXNlY3JldAo=", "encoding": "base64", "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } TASK [Check that conf file contains correct information] *********************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_subnet_to_subnet.yml:47 Monday 30 January 2023 09:34:41 +0000 (0:00:01.890) 0:01:56.794 ******** skipping: [sut] => (item={'content': 'IwojIEFuc2libGUgbWFuYWdlZAojCmNvbm4gbWFpbmhvc3QubG9jYWwtdG8taG9zdDAxLmxvY2FsCiAgbGVmdD1tYWluaG9zdC5sb2NhbAogIGxlZnRpZD1AbWFpbmhvc3QubG9jYWwKICByaWdodD1ob3N0MDEubG9jYWwKICByaWdodGlkPUBob3N0MDEubG9jYWwKICByaWdodHN1Ym5ldHM9ezE5Mi4wLjIuMC8yNCwxOTguNTEuMTAwLjAvMjQsMjAzLjAuMTEzLjAvMjR9CiAgaWtldjI9aW5zaXN0CiAgYXV0aGJ5PXNlY3JldAo=', 'source': '/etc/ipsec.d/mainhost.local-to-host01.local.conf', 'encoding': 'base64', 'invocation': {'module_args': {'src': '/etc/ipsec.d/mainhost.local-to-host01.local.conf'}}, 'failed': False, 'changed': False, 'item': 'host01.local', 'ansible_loop_var': 'item'}) => { "ansible_index_var": "idx", "ansible_loop_var": "item", "changed": false, "idx": 0, "item": { "ansible_loop_var": "item", "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCmNvbm4gbWFpbmhvc3QubG9jYWwtdG8taG9zdDAxLmxvY2FsCiAgbGVmdD1tYWluaG9zdC5sb2NhbAogIGxlZnRpZD1AbWFpbmhvc3QubG9jYWwKICByaWdodD1ob3N0MDEubG9jYWwKICByaWdodGlkPUBob3N0MDEubG9jYWwKICByaWdodHN1Ym5ldHM9ezE5Mi4wLjIuMC8yNCwxOTguNTEuMTAwLjAvMjQsMjAzLjAuMTEzLjAvMjR9CiAgaWtldjI9aW5zaXN0CiAgYXV0aGJ5PXNlY3JldAo=", "encoding": "base64", "failed": false, "invocation": { "module_args": { "src": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" } }, "item": "host01.local", "source": "/etc/ipsec.d/mainhost.local-to-host01.local.conf" }, "skip_reason": "Conditional result was False" } TASK [Assert success for conf files] ******************************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_subnet_to_subnet.yml:57 Monday 30 January 2023 09:34:41 +0000 (0:00:00.680) 0:01:57.474 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Check the firewall and the selinux port status] ************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_subnet_to_subnet.yml:62 Monday 30 January 2023 09:34:42 +0000 (0:00:00.375) 0:01:57.849 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/check_firewall_selinux.yml for sut TASK [Get firewall service] **************************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/check_firewall_selinux.yml:9 Monday 30 January 2023 09:34:42 +0000 (0:00:00.666) 0:01:58.516 ******** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--list-services" ], "delta": "0:00:00.390021", "end": "2023-01-30 09:34:43.657891", "rc": 0, "start": "2023-01-30 09:34:43.267870" } STDOUT: cockpit dhcpv6-client ipsec ssh TASK [Ensure 'ipsec' is in the firewalld service list] ************************* task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/check_firewall_selinux.yml:14 Monday 30 January 2023 09:34:43 +0000 (0:00:01.143) 0:01:59.659 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get associated selinux ports] ******************************************** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/check_firewall_selinux.yml:19 Monday 30 January 2023 09:34:44 +0000 (0:00:00.402) 0:02:00.083 ******** ok: [sut] => { "changed": false, "cmd": "set -euo pipefail\nfirewall-cmd --info-service=ipsec | egrep \"^ +ports: +\" | sed -e \"s/ *ports: //\"", "delta": "0:00:00.390320", "end": "2023-01-30 09:34:45.221104", "rc": 0, "start": "2023-01-30 09:34:44.830784" } STDOUT: 500/udp 4500/udp 4500/tcp TASK [Check associated selinux ports when vpn_manage_selinux is true] ********** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/check_firewall_selinux.yml:27 Monday 30 January 2023 09:34:45 +0000 (0:00:01.083) 0:02:01.166 ******** ok: [sut] => (item=500/udp) => { "ansible_loop_var": "item", "changed": false, "cmd": "set -euo pipefail\nsemanage port --list -C | grep ipsecnat_port_t | grep \"500\" | grep \"udp\"", "delta": "0:00:00.644029", "end": "2023-01-30 09:34:46.779139", "item": "500/udp", "rc": 0, "start": "2023-01-30 09:34:46.135110" } STDOUT: ipsecnat_port_t udp 500, 4500 ok: [sut] => (item=4500/udp) => { "ansible_loop_var": "item", "changed": false, "cmd": "set -euo pipefail\nsemanage port --list -C | grep ipsecnat_port_t | grep \"4500\" | grep \"udp\"", "delta": "0:00:00.643081", "end": "2023-01-30 09:34:47.908974", "item": "4500/udp", "rc": 0, "start": "2023-01-30 09:34:47.265893" } STDOUT: ipsecnat_port_t udp 500, 4500 ok: [sut] => (item=4500/tcp) => { "ansible_loop_var": "item", "changed": false, "cmd": "set -euo pipefail\nsemanage port --list -C | grep ipsecnat_port_t | grep \"4500\" | grep \"tcp\"", "delta": "0:00:00.643251", "end": "2023-01-30 09:34:49.137533", "item": "4500/tcp", "rc": 0, "start": "2023-01-30 09:34:48.494282" } STDOUT: ipsecnat_port_t tcp 4500 RUNNING HANDLER [fedora.linux_system_roles.vpn : Restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/handlers/main.yml:2 Monday 30 January 2023 09:34:49 +0000 (0:00:03.965) 0:02:05.132 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [fedora.linux_system_roles.vpn : Enable and restart vpn services] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 Monday 30 January 2023 09:34:49 +0000 (0:00:00.334) 0:02:05.466 ******** changed: [sut] => (item=ipsec) => { "ansible_job_id": "467328162712.7869", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/467328162712.7869", "started": 1 } RUNNING HANDLER [fedora.linux_system_roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 Monday 30 January 2023 09:34:52 +0000 (0:00:02.798) 0:02:08.264 ******** ok: [sut] => { "changed": false, "elapsed": 5 } RUNNING HANDLER [fedora.linux_system_roles.vpn : Restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/handlers/main.yml:2 Monday 30 January 2023 09:34:58 +0000 (0:00:05.885) 0:02:14.150 ******** included: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [fedora.linux_system_roles.vpn : Enable and restart vpn services] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 Monday 30 January 2023 09:34:58 +0000 (0:00:00.299) 0:02:14.450 ******** changed: [sut] => (item=ipsec) => { "ansible_job_id": "965444435507.8360", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/965444435507.8360", "started": 1 } RUNNING HANDLER [fedora.linux_system_roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 Monday 30 January 2023 09:35:00 +0000 (0:00:01.649) 0:02:16.099 ******** ok: [sut] => { "changed": false, "elapsed": 4 } META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* sut : ok=63 changed=12 unreachable=0 failed=0 skipped=34 rescued=0 ignored=0 Monday 30 January 2023 09:35:04 +0000 (0:00:04.384) 0:02:20.483 ******** =============================================================================== fedora.linux_system_roles.selinux : Set an SELinux label on a port ----- 14.80s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:90 fedora.linux_system_roles.vpn : Create ipsec.conf files ----------------- 9.20s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:160 fedora.linux_system_roles.vpn : Ensure required packages are installed --- 7.38s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:6 fedora.linux_system_roles.vpn : Wait for ssh connection to return ------- 5.89s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 5.35s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:5 fedora.linux_system_roles.vpn : Create ipsec.secrets files -------------- 4.74s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:174 fedora.linux_system_roles.vpn : Wait for ssh connection to return ------- 4.36s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 fedora.linux_system_roles.vpn : Populate service facts ------------------ 4.00s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:3 Check associated selinux ports when vpn_manage_selinux is true ---------- 3.97s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/check_firewall_selinux.yml:27 Gathering Facts --------------------------------------------------------- 3.62s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tests_subnet_to_subnet.yml:3 --- fedora.linux_system_roles.selinux : Install SELinux tool semanage ------- 3.29s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/set_facts_packages.yml:28 fedora.linux_system_roles.selinux : Install SELinux python3 tools ------- 3.05s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/set_facts_packages.yml:15 fedora.linux_system_roles.vpn : Enable and restart vpn services --------- 2.80s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 fedora.linux_system_roles.selinux : Get SELinux modules facts ----------- 2.77s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/selinux/tasks/main.yml:109 fedora.linux_system_roles.vpn : Get the ipsec tcp service ports --------- 2.60s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:12 Create nss directory for testing ---------------------------------------- 2.59s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/tests/tasks/setup_test.yml:21 -------- fedora.linux_system_roles.firewall : Configure firewall ----------------- 2.38s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:38 fedora.linux_system_roles.firewall : Install firewalld ------------------ 2.22s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:7 fedora.linux_system_roles.firewall : Install python3-firewall ----------- 2.17s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:18 fedora.linux_system_roles.vpn : Ensure ansible_facts used by role ------- 2.13s /WORKDIR/dist-git-vpn-weekly-ci-7omvoi8n/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- [DEPRECATION WARNING]: [defaults]callback_whitelist option, normalizing names to new standard, use callbacks_enabled instead. This feature will be removed from ansible-core in version 2.15. Deprecation warnings can be disabled by setting deprecation_warnings=False in ansible.cfg. ---^---^---^---^---^---