ansible-playbook [core 2.17.7] config file = None configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/local/lib/python3.12/site-packages/ansible ansible collection location = /tmp/collections-6Qm executable location = /usr/local/bin/ansible-playbook python version = 3.12.8 (main, Dec 3 2024, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-2)] (/usr/bin/python3.12) jinja version = 3.1.5 libyaml = True No config file found; using defaults running playbook inside collection fedora.linux_system_roles redirecting (type: callback) ansible.builtin.debug to ansible.posix.debug redirecting (type: callback) ansible.builtin.debug to ansible.posix.debug redirecting (type: callback) ansible.builtin.profile_tasks to ansible.posix.profile_tasks Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_default.yml **************************************************** 1 plays in /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/tests/pam_pwd/tests_default.yml PLAY [Ensure that the role runs with default parameters] *********************** TASK [Gathering Facts] ********************************************************* task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/tests/pam_pwd/tests_default.yml:3 Saturday 18 January 2025 10:08:30 -0500 (0:00:00.008) 0:00:00.008 ****** [WARNING]: Platform linux on host managed-node1 is using the discovered Python interpreter at /usr/bin/python3.9, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.17/reference_appendices/interpreter_discovery.html for more information. ok: [managed-node1] TASK [fedora.linux_system_roles.pam_pwd : Perform platform/version specific tasks] *** task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/main.yml:4 Saturday 18 January 2025 10:08:33 -0500 (0:00:03.086) 0:00:03.095 ****** included: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml for managed-node1 TASK [fedora.linux_system_roles.pam_pwd : Deny access after number of consecutive authentication failures num 5] *** task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:2 Saturday 18 January 2025 10:08:33 -0500 (0:00:00.038) 0:00:03.133 ****** changed: [managed-node1] => { "backup": "/etc/security/faillock.conf.6604.2025-01-18@10:08:34~", "changed": true } MSG: line added TASK [fedora.linux_system_roles.pam_pwd : Reenable access after the lock out seconds 300] *** task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:12 Saturday 18 January 2025 10:08:34 -0500 (0:00:00.516) 0:00:03.650 ****** changed: [managed-node1] => { "backup": "/etc/security/faillock.conf.6731.2025-01-18@10:08:34~", "changed": true } MSG: line added TASK [fedora.linux_system_roles.pam_pwd : Set option silent in /etc/security/faillock.conf] *** task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:20 Saturday 18 January 2025 10:08:34 -0500 (0:00:00.401) 0:00:04.051 ****** changed: [managed-node1] => { "backup": "/etc/security/faillock.conf.6858.2025-01-18@10:08:34~", "changed": true } MSG: line added TASK [fedora.linux_system_roles.pam_pwd : List authselect profiles] ************ task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:29 Saturday 18 January 2025 10:08:34 -0500 (0:00:00.342) 0:00:04.393 ****** ok: [managed-node1] => { "changed": false, "cmd": [ "authselect", "list" ], "delta": "0:00:00.167589", "end": "2025-01-18 10:08:35.450878", "rc": 0, "start": "2025-01-18 10:08:35.283289" } STDOUT: - minimal Local users only for minimal installations - sssd Enable SSSD for system authentication (also for local users only) - winbind Enable winbind for system authentication TASK [fedora.linux_system_roles.pam_pwd : Create custom authselect profile from existing profile sssd password-policy] *** task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:38 Saturday 18 January 2025 10:08:35 -0500 (0:00:00.605) 0:00:04.999 ****** Notification for handler Pam_pwd_authselect_apply has been saved. changed: [managed-node1] => { "changed": true, "cmd": [ "authselect", "create-profile", "password-policy", "-b", "sssd" ], "delta": "0:00:00.004076", "end": "2025-01-18 10:08:35.831761", "rc": 0, "start": "2025-01-18 10:08:35.827685" } STDOUT: New profile was created at /etc/authselect/custom/password-policy TASK [fedora.linux_system_roles.pam_pwd : List authselect current profile] ***** task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:46 Saturday 18 January 2025 10:08:35 -0500 (0:00:00.375) 0:00:05.375 ****** ok: [managed-node1] => { "changed": false, "cmd": [ "authselect", "current" ], "delta": "0:00:00.003977", "end": "2025-01-18 10:08:36.203940", "failed_when_result": false, "rc": 0, "start": "2025-01-18 10:08:36.199963" } STDOUT: Profile ID: sssd Enabled features: None TASK [fedora.linux_system_roles.pam_pwd : Select profile password-policy] ****** task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:58 Saturday 18 January 2025 10:08:36 -0500 (0:00:00.377) 0:00:05.752 ****** Notification for handler Pam_pwd_authselect_apply has been saved. changed: [managed-node1] => { "changed": true, "cmd": [ "authselect", "select", "--force", "custom/password-policy" ], "delta": "0:00:00.256316", "end": "2025-01-18 10:08:36.835375", "rc": 0, "start": "2025-01-18 10:08:36.579059" } STDOUT: Backup stored at /var/lib/authselect/backups/2025-01-18-15-08-36.vyzNvK Profile "custom/password-policy" was selected. The following nsswitch maps are overwritten by the profile: - passwd - group - netgroup - automount - services Make sure that SSSD service is configured and enabled. See SSSD documentation for more information. TASK [fedora.linux_system_roles.pam_pwd : List authselect current profile] ***** task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:64 Saturday 18 January 2025 10:08:36 -0500 (0:00:00.626) 0:00:06.379 ****** ok: [managed-node1] => { "changed": false, "cmd": [ "authselect", "current" ], "delta": "0:00:00.003434", "end": "2025-01-18 10:08:37.203891", "rc": 0, "start": "2025-01-18 10:08:37.200457" } STDOUT: Profile ID: custom/password-policy Enabled features: None TASK [fedora.linux_system_roles.pam_pwd : Set enable-feature with-faillock] **** task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:69 Saturday 18 January 2025 10:08:37 -0500 (0:00:00.369) 0:00:06.748 ****** Notification for handler Pam_pwd_authselect_apply has been saved. changed: [managed-node1] => { "changed": true, "cmd": [ "authselect", "enable-feature", "with-faillock" ], "delta": "0:00:00.012104", "end": "2025-01-18 10:08:37.597352", "rc": 0, "start": "2025-01-18 10:08:37.585248" } STDOUT: Make sure that SSSD service is configured and enabled. See SSSD documentation for more information. TASK [fedora.linux_system_roles.pam_pwd : Keep history of the last passwords used num 10] *** task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:75 Saturday 18 January 2025 10:08:37 -0500 (0:00:00.389) 0:00:07.138 ****** changed: [managed-node1] => (item=/etc/authselect/custom/password-policy/system-auth) => { "ansible_loop_var": "item", "backup": "/etc/authselect/custom/password-policy/system-auth.7741.2025-01-18@10:08:37~", "changed": true, "item": "/etc/authselect/custom/password-policy/system-auth" } MSG: line added changed: [managed-node1] => (item=/etc/authselect/custom/password-policy/password-auth) => { "ansible_loop_var": "item", "backup": "/etc/authselect/custom/password-policy/password-auth.7868.2025-01-18@10:08:38~", "changed": true, "item": "/etc/authselect/custom/password-policy/password-auth" } MSG: line added TASK [fedora.linux_system_roles.pam_pwd : Enforce root for password complexity] *** task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:89 Saturday 18 January 2025 10:08:38 -0500 (0:00:00.702) 0:00:07.840 ****** changed: [managed-node1] => (item=/etc/authselect/custom/password-policy/system-auth) => { "ansible_loop_var": "item", "backup": "/etc/authselect/custom/password-policy/system-auth.7995.2025-01-18@10:08:38~", "changed": true, "item": "/etc/authselect/custom/password-policy/system-auth" } MSG: line replaced changed: [managed-node1] => (item=/etc/authselect/custom/password-policy/password-auth) => { "ansible_loop_var": "item", "backup": "/etc/authselect/custom/password-policy/password-auth.8122.2025-01-18@10:08:39~", "changed": true, "item": "/etc/authselect/custom/password-policy/password-auth" } MSG: line replaced TASK [fedora.linux_system_roles.pam_pwd : Set password quality] **************** task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/main.yml:17 Saturday 18 January 2025 10:08:39 -0500 (0:00:00.738) 0:00:08.579 ****** changed: [managed-node1] => { "backup_file": "/etc/security/pwquality.conf.8249.2025-01-18@10:08:39~", "changed": true } MSG: Block inserted NOTIFIED HANDLER fedora.linux_system_roles.pam_pwd : Apply authselect changes for managed-node1 RUNNING HANDLER [fedora.linux_system_roles.pam_pwd : Apply authselect changes] *** task path: /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/handlers/main.yml:5 Saturday 18 January 2025 10:08:39 -0500 (0:00:00.483) 0:00:09.062 ****** changed: [managed-node1] => { "changed": true, "cmd": [ "authselect", "apply-changes" ], "delta": "0:00:00.014571", "end": "2025-01-18 10:08:39.882266", "rc": 0, "start": "2025-01-18 10:08:39.867695" } STDOUT: Changes were successfully applied. PLAY RECAP ********************************************************************* managed-node1 : ok=15 changed=10 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 TASKS RECAP ******************************************************************** Saturday 18 January 2025 10:08:39 -0500 (0:00:00.355) 0:00:09.418 ****** =============================================================================== Gathering Facts --------------------------------------------------------- 3.09s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/tests/pam_pwd/tests_default.yml:3 fedora.linux_system_roles.pam_pwd : Enforce root for password complexity --- 0.74s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:89 fedora.linux_system_roles.pam_pwd : Keep history of the last passwords used num 10 --- 0.70s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:75 fedora.linux_system_roles.pam_pwd : Select profile password-policy ------ 0.63s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:58 fedora.linux_system_roles.pam_pwd : List authselect profiles ------------ 0.61s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:29 fedora.linux_system_roles.pam_pwd : Deny access after number of consecutive authentication failures num 5 --- 0.52s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:2 fedora.linux_system_roles.pam_pwd : Set password quality ---------------- 0.48s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/main.yml:17 fedora.linux_system_roles.pam_pwd : Reenable access after the lock out seconds 300 --- 0.40s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:12 fedora.linux_system_roles.pam_pwd : Set enable-feature with-faillock ---- 0.39s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:69 fedora.linux_system_roles.pam_pwd : List authselect current profile ----- 0.38s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:46 fedora.linux_system_roles.pam_pwd : Create custom authselect profile from existing profile sssd password-policy --- 0.38s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:38 fedora.linux_system_roles.pam_pwd : List authselect current profile ----- 0.37s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:64 fedora.linux_system_roles.pam_pwd : Apply authselect changes ------------ 0.36s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/handlers/main.yml:5 fedora.linux_system_roles.pam_pwd : Set option silent in /etc/security/faillock.conf --- 0.34s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:20 fedora.linux_system_roles.pam_pwd : Perform platform/version specific tasks --- 0.04s /tmp/collections-6Qm/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/main.yml:4