# STDOUT: ---v---v---v---v---v--- Using /etc/ansible/ansible.cfg as config file PLAY [all] ********************************************************************* TASK [Gathering Facts] ********************************************************* ok: [sut] TASK [Set up test environment] ************************************************* included: /WORKDIR/dist-git-vpn-ci-testing-gsROiC/tests/tasks/setup_test.yml for sut TASK [Set platform/version specific variables] ********************************* TASK [linux-system-roles.vpn : Ensure ansible_facts used by role] ************** ok: [sut] TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=Fedora.yml) => { "ansible_facts": {}, "ansible_included_var_files": [ "/WORKDIR/dist-git-vpn-ci-testing-gsROiC/tests/roles/linux-system-roles.vpn/vars/Fedora.yml" ], "ansible_loop_var": "item", "changed": false, "item": "Fedora.yml" } skipping: [sut] => (item=Fedora_35.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora_35.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=Fedora_35.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora_35.yml", "skip_reason": "Conditional result was False" } TASK [Change inventory_hostname] *********************************************** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [add dummy main host] ***************************************************** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create nss directory for testing] **************************************** changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/var/lib/ipsec/nss", "secontext": "unconfined_u:object_r:var_lib_t:s0", "size": 4096, "state": "directory", "uid": 0 } TASK [Create /etc/ipsec.d directory for testing] ******************************* changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 4096, "state": "directory", "uid": 0 } TASK [Dynamically add more hosts] ********************************************** included: /WORKDIR/dist-git-vpn-ci-testing-gsROiC/tests/tasks/add_hosts.yml for sut TASK [dynamically add multiple hosts for testing] ****************************** changed: [sut] => (item=1) => { "add_host": { "groups": [ "testing" ], "host_name": "host01.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 1 } changed: [sut] => (item=2) => { "add_host": { "groups": [ "testing" ], "host_name": "host02.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 2 } TASK [create mock vpn_connections] ********************************************* ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "hosts": { "host01.local": "", "host02.local": "", "sut": "" } } ] }, "changed": false } TASK [Create dummy policies directory for testing] ***************************** changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d/policies", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 4096, "state": "directory", "uid": 0 } TASK [Create dummy policy files for testing] *********************************** changed: [sut] => { "changed": true, "dest": "/etc/ipsec.d/policies/private", "gid": 0, "group": "root", "mode": "0600", "owner": "root", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 0, "state": "file", "uid": 0 } TASK [Create dummy policy files for testing] *********************************** changed: [sut] => { "changed": true, "dest": "/etc/ipsec.d/policies/private-or-clear", "gid": 0, "group": "root", "mode": "0600", "owner": "root", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 0, "state": "file", "uid": 0 } TASK [Create dummy policy files for testing] *********************************** changed: [sut] => { "changed": true, "dest": "/etc/ipsec.d/policies/clear", "gid": 0, "group": "root", "mode": "0600", "owner": "root", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 0, "state": "file", "uid": 0 } TASK [Add extra options to check] ********************************************** ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "cert", "hosts": { "host01.local": "", "host02.local": "", "sut": "" }, "opportunistic": true, "policies": [ { "cidr": "203.0.113.0/24", "policy": "private" }, { "cidr": "198.51.100.0/24", "policy": "clear" } ] } ] }, "changed": false } TASK [add cert_name fact to controller] **************************************** ok: [sut] => { "ansible_facts": { "cert_name": "main_cert" }, "changed": false } TASK [Use vpn role] ************************************************************ TASK [linux-system-roles.vpn : set platform/version specific variables] ******** included: /WORKDIR/dist-git-vpn-ci-testing-gsROiC/tests/roles/linux-system-roles.vpn/tasks/set_vars.yml for sut TASK [linux-system-roles.vpn : Ensure ansible_facts used by role] ************** ok: [sut] TASK [linux-system-roles.vpn : Set platform/version specific variables] ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=Fedora.yml) => { "ansible_facts": {}, "ansible_included_var_files": [ "/WORKDIR/dist-git-vpn-ci-testing-gsROiC/tests/roles/linux-system-roles.vpn/vars/Fedora.yml" ], "ansible_loop_var": "item", "changed": false, "item": "Fedora.yml" } skipping: [sut] => (item=Fedora_35.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora_35.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=Fedora_35.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora_35.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.vpn : Ensure required packages are installed] ********* changed: [sut] => { "changed": true, "rc": 0, "results": [ "Installed: nss-tools-3.77.0-1.fc35.x86_64", "Installed: libreswan-4.6-1.fc35.x86_64", "Installed: ldns-1.8.1-3.fc35.x86_64", "Installed: unbound-libs-1.13.2-1.fc35.x86_64", "Installed: logrotate-3.18.1-2.fc35.x86_64" ] } TASK [linux-system-roles.vpn : List packages on the controller to see if OpenSSL is installed] *** fatal: [sut -> localhost]: FAILED! => { "changed": false } MSG: Could not detect a supported package manager from the following list: ['pkg', 'apt', 'rpm', 'portage'], or the required Python library is not installed. Check warnings for details. NO MORE HOSTS LEFT ************************************************************* to retry, use: --limit @/tmp/tests_mesh_cert.retry PLAY RECAP ********************************************************************* sut : ok=19 changed=8 unreachable=0 failed=1 skipped=2 rescued=0 ignored=0 ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- [WARNING]: Found "rpm" but Failed to import the required Python library (rpm) on 10.29.163.178's Python /opt/ansible-2.9/bin/python3. Please read module documentation and install in the appropriate location. If the required library is installed, but Ansible is using the wrong Python interpreter, please consult the documentation on ansible_python_interpreter ---^---^---^---^---^---