# STDOUT: ---v---v---v---v---v--- ansible-playbook 2.9.27 config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.9/lib/python3.9/site-packages/ansible executable location = /opt/ansible-2.9/bin/ansible-playbook python version = 3.9.18 (main, Sep 7 2023, 00:00:00) [GCC 11.4.1 20230605 (Red Hat 11.4.1-2)] Using /etc/ansible/ansible.cfg as config file Skipping callback 'actionable', as we already have a stdout callback. Skipping callback 'counter_enabled', as we already have a stdout callback. Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'full_skip', as we already have a stdout callback. Skipping callback 'json', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'null', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. Skipping callback 'selective', as we already have a stdout callback. Skipping callback 'skippy', as we already have a stdout callback. Skipping callback 'stderr', as we already have a stdout callback. Skipping callback 'unixy', as we already have a stdout callback. Skipping callback 'yaml', as we already have a stdout callback. PLAYBOOK: tests_reboot.yml ***************************************************** 1 plays in /WORKDIR/git-weekly-ci1_aqk6dk/tests/tests_reboot.yml PLAY [Ensure we can set crypto policy including reboot of the system] ********** TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/tests_reboot.yml:3 Saturday 10 August 2024 04:33:17 +0000 (0:00:00.013) 0:00:00.013 ******* ok: [sut] META: ran handlers TASK [Ensure we can set crypto policy including reboot of the system] ********** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/tests_reboot.yml:11 Saturday 10 August 2024 04:33:17 +0000 (0:00:00.653) 0:00:00.666 ******* TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:3 Saturday 10 August 2024 04:33:17 +0000 (0:00:00.027) 0:00:00.694 ******* included: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml for sut TASK [linux-system-roles.crypto_policies : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:2 Saturday 10 August 2024 04:33:17 +0000 (0:00:00.016) 0:00:00.710 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:11 Saturday 10 August 2024 04:33:17 +0000 (0:00:00.020) 0:00:00.731 ******* ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [linux-system-roles.crypto_policies : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:16 Saturday 10 August 2024 04:33:18 +0000 (0:00:00.253) 0:00:00.985 ******* ok: [sut] => { "ansible_facts": { "__crypto_policies_is_ostree": false }, "changed": false } TASK [linux-system-roles.crypto_policies : Check if transactional-update exists in /sbin] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:23 Saturday 10 August 2024 04:33:18 +0000 (0:00:00.022) 0:00:01.007 ******* ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [linux-system-roles.crypto_policies : Set flag if transactional-update exists] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:28 Saturday 10 August 2024 04:33:18 +0000 (0:00:00.171) 0:00:01.179 ******* ok: [sut] => { "ansible_facts": { "__crypto_policies_is_transactional": false }, "changed": false } TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:32 Saturday 10 August 2024 04:33:18 +0000 (0:00:00.022) 0:00:01.202 ******* skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Ensure required packages are installed] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 Saturday 10 August 2024 04:33:18 +0000 (0:00:00.033) 0:00:01.235 ******* ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do lsrpackages: crypto-policies crypto-policies-scripts TASK [linux-system-roles.crypto_policies : Notify user that reboot is needed to apply changes] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:19 Saturday 10 August 2024 04:33:20 +0000 (0:00:02.642) 0:00:03.878 ******* skipping: [sut] => {} TASK [linux-system-roles.crypto_policies : Reboot transactional update systems] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:24 Saturday 10 August 2024 04:33:20 +0000 (0:00:00.019) 0:00:03.898 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Fail if reboot is needed and not set] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:29 Saturday 10 August 2024 04:33:20 +0000 (0:00:00.018) 0:00:03.916 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Gather facts] *********************** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:37 Saturday 10 August 2024 04:33:20 +0000 (0:00:00.018) 0:00:03.935 ******* included: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 10 August 2024 04:33:20 +0000 (0:00:00.011) 0:00:03.946 ******* ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.047739", "end": "2024-08-10 04:33:21.254862", "rc": 0, "start": "2024-08-10 04:33:21.207123" } STDOUT: DEFAULT TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 10 August 2024 04:33:21 +0000 (0:00:00.280) 0:00:04.227 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_active": "DEFAULT" }, "changed": false } TASK [linux-system-roles.crypto_policies : Find base policies files] *********** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:40 Saturday 10 August 2024 04:33:21 +0000 (0:00:00.020) 0:00:04.247 ******* ok: [sut] => { "changed": false, "examined": 7, "files": [ { "atime": 1716968748.851, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4047304, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/DEFAULT.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2153, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4047305, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/EMPTY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 267, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4047306, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FIPS.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 1726, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4047307, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FUTURE.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2102, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4047308, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/LEGACY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2471, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 5 } TASK [linux-system-roles.crypto_policies : Set available base policies fact] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:48 Saturday 10 August 2024 04:33:21 +0000 (0:00:00.238) 0:00:04.486 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_available_policies": [ "EMPTY", "FUTURE", "DEFAULT", "FIPS", "LEGACY" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Find subpolicy files] *************** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:55 Saturday 10 August 2024 04:33:21 +0000 (0:00:00.021) 0:00:04.507 ******* ok: [sut] => { "changed": false, "examined": 5, "files": [ { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4695037, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/AD-SUPPORT.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 322, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4695038, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/ECDHE-ONLY.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 121, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4695039, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-CAMELLIA.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 90, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4695104, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-SHA1.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 123, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4695105, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/OSPP.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 1986, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 5 } TASK [linux-system-roles.crypto_policies : Set available subpolicies fact] ***** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:63 Saturday 10 August 2024 04:33:21 +0000 (0:00:00.164) 0:00:04.672 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_available_subpolicies": [ "NO-SHA1", "AD-SUPPORT", "ECDHE-ONLY", "OSPP", "NO-CAMELLIA" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Set crypto_policies_available_modules fact (deprecated)] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:70 Saturday 10 August 2024 04:33:21 +0000 (0:00:00.019) 0:00:04.692 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_available_modules": [ "NO-SHA1", "AD-SUPPORT", "ECDHE-ONLY", "OSPP", "NO-CAMELLIA" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Update crypto policy if needed] ***** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:76 Saturday 10 August 2024 04:33:21 +0000 (0:00:00.018) 0:00:04.711 ******* NOTIFIED HANDLER linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes for sut NOTIFIED HANDLER linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag for sut changed: [sut] => { "changed": true, "cmd": [ "update-crypto-policies", "--set", "FUTURE" ], "delta": "0:00:00.121297", "end": "2024-08-10 04:33:22.038407", "rc": 0, "start": "2024-08-10 04:33:21.917110" } STDOUT: Setting system policy to FUTURE Note: System-wide crypto policies are applied on application start-up. It is recommended to restart the system for the change of policies to fully take place. TASK [linux-system-roles.crypto_policies : Set the reboot_required flag if needed] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:88 Saturday 10 August 2024 04:33:22 +0000 (0:00:00.300) 0:00:05.012 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_reboot_required": true }, "changed": false } TASK [linux-system-roles.crypto_policies : Update facts after applying policy] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:96 Saturday 10 August 2024 04:33:22 +0000 (0:00:00.021) 0:00:05.033 ******* included: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 10 August 2024 04:33:22 +0000 (0:00:00.011) 0:00:05.044 ******* ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.047948", "end": "2024-08-10 04:33:22.285059", "rc": 0, "start": "2024-08-10 04:33:22.237111" } STDOUT: FUTURE TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 10 August 2024 04:33:22 +0000 (0:00:00.212) 0:00:05.257 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_active": "FUTURE" }, "changed": false } RUNNING HANDLER [linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:4 Saturday 10 August 2024 04:33:22 +0000 (0:00:00.016) 0:00:05.274 ******* changed: [sut] => { "changed": true, "elapsed": 21, "rebooted": true } RUNNING HANDLER [linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:11 Saturday 10 August 2024 04:33:44 +0000 (0:00:22.107) 0:00:27.381 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_reboot_required": false }, "changed": false } META: ran handlers TASK [Check the current policy is FUTURE] ************************************** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/tests_reboot.yml:22 Saturday 10 August 2024 04:33:44 +0000 (0:00:00.023) 0:00:27.405 ******* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Restore policy to DEFAULT] *********************************************** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/tests_reboot.yml:29 Saturday 10 August 2024 04:33:44 +0000 (0:00:00.019) 0:00:27.425 ******* TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:3 Saturday 10 August 2024 04:33:44 +0000 (0:00:00.020) 0:00:27.446 ******* included: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml for sut TASK [linux-system-roles.crypto_policies : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:2 Saturday 10 August 2024 04:33:44 +0000 (0:00:00.011) 0:00:27.457 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:11 Saturday 10 August 2024 04:33:44 +0000 (0:00:00.018) 0:00:27.476 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:16 Saturday 10 August 2024 04:33:44 +0000 (0:00:00.017) 0:00:27.493 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Check if transactional-update exists in /sbin] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:23 Saturday 10 August 2024 04:33:44 +0000 (0:00:00.016) 0:00:27.510 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Set flag if transactional-update exists] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:28 Saturday 10 August 2024 04:33:44 +0000 (0:00:00.018) 0:00:27.528 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:32 Saturday 10 August 2024 04:33:44 +0000 (0:00:00.018) 0:00:27.546 ******* skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Ensure required packages are installed] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 Saturday 10 August 2024 04:33:44 +0000 (0:00:00.030) 0:00:27.577 ******* ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do lsrpackages: crypto-policies crypto-policies-scripts TASK [linux-system-roles.crypto_policies : Notify user that reboot is needed to apply changes] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:19 Saturday 10 August 2024 04:33:48 +0000 (0:00:04.294) 0:00:31.871 ******* skipping: [sut] => {} TASK [linux-system-roles.crypto_policies : Reboot transactional update systems] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:24 Saturday 10 August 2024 04:33:48 +0000 (0:00:00.019) 0:00:31.890 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Fail if reboot is needed and not set] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:29 Saturday 10 August 2024 04:33:48 +0000 (0:00:00.018) 0:00:31.909 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Gather facts] *********************** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:37 Saturday 10 August 2024 04:33:48 +0000 (0:00:00.019) 0:00:31.928 ******* included: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 10 August 2024 04:33:48 +0000 (0:00:00.011) 0:00:31.940 ******* ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.094475", "end": "2024-08-10 04:33:48.795994", "rc": 0, "start": "2024-08-10 04:33:48.701519" } STDOUT: FUTURE TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 10 August 2024 04:33:49 +0000 (0:00:00.257) 0:00:32.198 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_active": "FUTURE" }, "changed": false } TASK [linux-system-roles.crypto_policies : Find base policies files] *********** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:40 Saturday 10 August 2024 04:33:49 +0000 (0:00:00.018) 0:00:32.217 ******* ok: [sut] => { "changed": false, "examined": 7, "files": [ { "atime": 1716968748.851, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4047304, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/DEFAULT.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2153, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4047305, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/EMPTY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 267, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4047306, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FIPS.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 1726, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1723264401.9602637, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4047307, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FUTURE.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2102, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4047308, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/LEGACY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2471, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 5 } TASK [linux-system-roles.crypto_policies : Set available base policies fact] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:48 Saturday 10 August 2024 04:33:49 +0000 (0:00:00.171) 0:00:32.388 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_available_policies": [ "EMPTY", "FUTURE", "DEFAULT", "FIPS", "LEGACY" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Find subpolicy files] *************** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:55 Saturday 10 August 2024 04:33:49 +0000 (0:00:00.021) 0:00:32.410 ******* ok: [sut] => { "changed": false, "examined": 5, "files": [ { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4695037, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/AD-SUPPORT.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 322, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4695038, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/ECDHE-ONLY.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 121, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4695039, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-CAMELLIA.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 90, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4695104, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-SHA1.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 123, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1716968718.641, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 4695105, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/OSPP.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 1986, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 5 } TASK [linux-system-roles.crypto_policies : Set available subpolicies fact] ***** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:63 Saturday 10 August 2024 04:33:49 +0000 (0:00:00.175) 0:00:32.585 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_available_subpolicies": [ "NO-SHA1", "AD-SUPPORT", "ECDHE-ONLY", "OSPP", "NO-CAMELLIA" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Set crypto_policies_available_modules fact (deprecated)] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:70 Saturday 10 August 2024 04:33:49 +0000 (0:00:00.021) 0:00:32.607 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_available_modules": [ "NO-SHA1", "AD-SUPPORT", "ECDHE-ONLY", "OSPP", "NO-CAMELLIA" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Update crypto policy if needed] ***** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:76 Saturday 10 August 2024 04:33:49 +0000 (0:00:00.019) 0:00:32.627 ******* NOTIFIED HANDLER linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes for sut NOTIFIED HANDLER linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag for sut NOTIFIED HANDLER linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes for sut NOTIFIED HANDLER linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag for sut changed: [sut] => { "changed": true, "cmd": [ "update-crypto-policies", "--set", "DEFAULT" ], "delta": "0:00:00.141084", "end": "2024-08-10 04:33:49.600995", "rc": 0, "start": "2024-08-10 04:33:49.459911" } STDOUT: Setting system policy to DEFAULT Note: System-wide crypto policies are applied on application start-up. It is recommended to restart the system for the change of policies to fully take place. TASK [linux-system-roles.crypto_policies : Set the reboot_required flag if needed] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:88 Saturday 10 August 2024 04:33:49 +0000 (0:00:00.314) 0:00:32.942 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_reboot_required": true }, "changed": false } TASK [linux-system-roles.crypto_policies : Update facts after applying policy] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:96 Saturday 10 August 2024 04:33:50 +0000 (0:00:00.020) 0:00:32.963 ******* included: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 10 August 2024 04:33:50 +0000 (0:00:00.011) 0:00:32.974 ******* ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.054944", "end": "2024-08-10 04:33:49.871591", "rc": 0, "start": "2024-08-10 04:33:49.816647" } STDOUT: DEFAULT TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 10 August 2024 04:33:50 +0000 (0:00:00.216) 0:00:33.190 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_active": "DEFAULT" }, "changed": false } RUNNING HANDLER [linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:4 Saturday 10 August 2024 04:33:50 +0000 (0:00:00.017) 0:00:33.208 ******* changed: [sut] => { "changed": true, "elapsed": 20, "rebooted": true } RUNNING HANDLER [linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:11 Saturday 10 August 2024 04:34:11 +0000 (0:00:21.472) 0:00:54.680 ******* ok: [sut] => { "ansible_facts": { "crypto_policies_reboot_required": false }, "changed": false } RUNNING HANDLER [linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:4 Saturday 10 August 2024 04:34:11 +0000 (0:00:00.021) 0:00:54.702 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } RUNNING HANDLER [linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag] *** task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:11 Saturday 10 August 2024 04:34:11 +0000 (0:00:00.018) 0:00:54.721 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } META: ran handlers TASK [Check the current policy has been restored to DEFAULT] ******************* task path: /WORKDIR/git-weekly-ci1_aqk6dk/tests/tests_reboot.yml:43 Saturday 10 August 2024 04:34:11 +0000 (0:00:00.022) 0:00:54.744 ******* ok: [sut] => { "changed": false } MSG: All assertions passed META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* sut : ok=41 changed=4 unreachable=0 failed=0 skipped=16 rescued=0 ignored=0 Saturday 10 August 2024 04:34:11 +0000 (0:00:00.019) 0:00:54.763 ******* =============================================================================== linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes -- 43.58s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:4 linux-system-roles.crypto_policies : Ensure required packages are installed --- 4.29s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 linux-system-roles.crypto_policies : Ensure required packages are installed --- 2.64s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 Gathering Facts --------------------------------------------------------- 0.65s /WORKDIR/git-weekly-ci1_aqk6dk/tests/tests_reboot.yml:3 ----------------------- linux-system-roles.crypto_policies : Update crypto policy if needed ----- 0.31s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:76 linux-system-roles.crypto_policies : Update crypto policy if needed ----- 0.30s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:76 linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.28s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.26s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Check if system is ostree ---------- 0.25s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:11 linux-system-roles.crypto_policies : Find base policies files ----------- 0.24s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:40 linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.22s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.21s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Find subpolicy files --------------- 0.18s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:55 linux-system-roles.crypto_policies : Find base policies files ----------- 0.17s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:40 linux-system-roles.crypto_policies : Check if transactional-update exists in /sbin --- 0.17s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:23 linux-system-roles.crypto_policies : Find subpolicy files --------------- 0.16s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:55 linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag --- 0.05s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:11 linux-system-roles.crypto_policies : Set platform/version specific variables --- 0.03s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:32 linux-system-roles.crypto_policies : Set platform/version specific variables --- 0.03s /WORKDIR/git-weekly-ci1_aqk6dk/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:32 Ensure we can set crypto policy including reboot of the system ---------- 0.03s /WORKDIR/git-weekly-ci1_aqk6dk/tests/tests_reboot.yml:11 ---------------------- ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- ---^---^---^---^---^---