# STDOUT: ---v---v---v---v---v--- Using /etc/ansible/ansible.cfg as config file PLAY [Issue many self-signed certificates] ************************************* TASK [Gathering Facts] ********************************************************* ok: [sut] TASK [linux-system-roles.certificate : Set version specific variables] ********* included: /WORKDIR/dist-git-certificate-setup-snapshot-no-gather-facts-kugxkU/tests/roles/linux-system-roles.certificate/tasks/set_vars.yml for sut TASK [linux-system-roles.certificate : Ensure ansible_facts used by role] ****** ok: [sut] TASK [linux-system-roles.certificate : Set platform/version specific variables] *** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat_8.5.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.5.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.certificate : Ensure certificate role dependencies are installed] *** changed: [sut] => { "changed": true, "rc": 0, "results": [ "Installed: python3-pyasn1-0.3.7-6.el8.noarch" ] } TASK [linux-system-roles.certificate : Ensure provider packages are installed] *** changed: [sut] => (item=certmonger) => { "__certificate_provider": "certmonger", "ansible_loop_var": "__certificate_provider", "changed": true, "rc": 0, "results": [ "Installed: certmonger-0.79.13-3.el8.x86_64", "Installed: xmlrpc-c-1.51.0-5.el8.x86_64", "Installed: xmlrpc-c-client-1.51.0-5.el8.x86_64" ] } TASK [linux-system-roles.certificate : Ensure pre-scripts hooks directory exists] *** changed: [sut] => (item=certmonger) => { "__certificate_provider": "certmonger", "ansible_loop_var": "__certificate_provider", "changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/etc/certmonger//pre-scripts", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0 } TASK [linux-system-roles.certificate : Ensure post-scripts hooks directory exists] *** changed: [sut] => (item=certmonger) => { "__certificate_provider": "certmonger", "ansible_loop_var": "__certificate_provider", "changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/etc/certmonger//post-scripts", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0 } TASK [linux-system-roles.certificate : Ensure provider service is running] ***** changed: [sut] => (item=certmonger) => { "__certificate_provider": "certmonger", "ansible_loop_var": "__certificate_provider", "changed": true, "enabled": true, "name": "certmonger", "state": "started", "status": { "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "syslog.target system.slice basic.target sysinit.target network.target dbus.socket systemd-journald.socket dbus.service", "AllowIsolate": "no", "AllowedCPUs": "", "AllowedMemoryNodes": "", "AmbientCapabilities": "", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedorahosted.certmonger", "CPUAccounting": "no", "CPUAffinity": "", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "ConfigurationDirectoryMode": "0755", "Conflicts": "shutdown.target", "ControlPID": "0", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "Delegate": "no", "Description": "Certificate monitoring and PKI enrollment", "DevicePolicy": "auto", "DynamicUser": "no", "EffectiveCPUs": "", "EffectiveMemoryNodes": "", "EnvironmentFiles": "/etc/sysconfig/certmonger (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/sbin/certmonger ; argv[]=/usr/sbin/certmonger -S -p /run/certmonger.pid -n $OPTS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/certmonger.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOSchedulingClass": "0", "IOSchedulingPriority": "0", "IOWeight": "[not set]", "IPAccounting": "no", "IPEgressBytes": "18446744073709551615", "IPEgressPackets": "18446744073709551615", "IPIngressBytes": "18446744073709551615", "IPIngressPackets": "18446744073709551615", "Id": "certmonger.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "0", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "262144", "LimitNOFILESoft": "1024", "LimitNPROC": "14166", "LimitNPROCSoft": "14166", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14166", "LimitSIGPENDINGSoft": "14166", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "0", "MemoryAccounting": "yes", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemorySwapMax": "infinity", "MountAPIVFS": "no", "MountFlags": "", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAMask": "", "NUMAPolicy": "n/a", "Names": "certmonger.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PIDFile": "/run/certmonger.pid", "PartOf": "dbus.service", "PermissionsStartOnly": "no", "Perpetual": "no", "PrivateDevices": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "sysinit.target dbus.socket system.slice", "Restart": "no", "RestartUSec": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardInputData": "", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StateChangeTimestampMonotonic": "0", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "[not set]", "TasksMax": "22665", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "disabled", "UtmpMode": "init", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0" } } TASK [linux-system-roles.certificate : Ensure certificate requests] ************ changed: [sut] => (item={'name': 'mycert_many_self_signed', 'dns': 'www.example.com', 'ca': 'self-sign'}) => { "ansible_loop_var": "item", "changed": true, "item": { "ca": "self-sign", "dns": "www.example.com", "name": "mycert_many_self_signed" } } MSG: Certificate requested (new). changed: [sut] => (item={'name': 'other-cert', 'dns': 'www.example.org', 'ca': 'self-sign'}) => { "ansible_loop_var": "item", "changed": true, "item": { "ca": "self-sign", "dns": "www.example.org", "name": "other-cert" } } MSG: Certificate requested (new). changed: [sut] => (item={'name': 'another-cert', 'dns': 'www.example.net', 'ca': 'self-sign'}) => { "ansible_loop_var": "item", "changed": true, "item": { "ca": "self-sign", "dns": "www.example.net", "name": "another-cert" } } MSG: Certificate requested (new). PLAY [Verify certificate] ****************************************************** TASK [Gathering Facts] ********************************************************* ok: [sut] TASK [Verify each certificate] ************************************************* included: /WORKDIR/dist-git-certificate-setup-snapshot-no-gather-facts-kugxkU/tests/tasks/assert_certificate_parameters.yml for sut included: /WORKDIR/dist-git-certificate-setup-snapshot-no-gather-facts-kugxkU/tests/tasks/assert_certificate_parameters.yml for sut included: /WORKDIR/dist-git-certificate-setup-snapshot-no-gather-facts-kugxkU/tests/tasks/assert_certificate_parameters.yml for sut TASK [Set virtualenv_path] ***************************************************** ok: [sut] => { "ansible_facts": { "__virtualenv_path": "/tmp/certificate-tests-venv" }, "changed": false } TASK [Ensure python3 is installed] ********************************************* ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do TASK [Install the package, force upgrade] ************************************** changed: [sut] => { "changed": true, "cmd": [ "/tmp/certificate-tests-venv/bin/pip3", "install", "-U", "pip" ], "name": [ "pip" ], "requirements": null, "state": "latest", "version": null, "virtualenv": "/tmp/certificate-tests-venv" } STDOUT: Collecting pip Downloading https://files.pythonhosted.org/packages/a4/6d/6463d49a933f547439d6b5b98b46af8742cc03ae83543e4d7688c2420f8b/pip-21.3.1-py3-none-any.whl (1.7MB) Installing collected packages: pip Found existing installation: pip 9.0.3 Uninstalling pip-9.0.3: Successfully uninstalled pip-9.0.3 Successfully installed pip-21.3.1 STDERR: You are using pip version 21.3.1, however version 22.0.4 is available. You should consider upgrading via the 'pip install --upgrade pip' command. TASK [Install certreader] ****************************************************** changed: [sut] => { "changed": true, "cmd": [ "/tmp/certificate-tests-venv/bin/pip3", "install", "cryptography<35", "certreader>=0.1.1" ], "name": [ "cryptography<35", "certreader>=0.1.1" ], "requirements": null, "state": "present", "version": null, "virtualenv": "/tmp/certificate-tests-venv" } STDOUT: Collecting cryptography<35 Downloading cryptography-3.4.8-cp36-abi3-manylinux_2_24_x86_64.whl (3.0 MB) Collecting certreader>=0.1.1 Downloading certreader-0.1.1.tar.gz (4.4 kB) Preparing metadata (setup.py): started Preparing metadata (setup.py): finished with status 'done' Collecting cffi>=1.12 Downloading cffi-1.15.0-cp36-cp36m-manylinux_2_5_x86_64.manylinux1_x86_64.whl (405 kB) Collecting pyasn1 Downloading pyasn1-0.4.8-py2.py3-none-any.whl (77 kB) Collecting pyyaml Downloading PyYAML-6.0-cp36-cp36m-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl (603 kB) Collecting pycparser Downloading pycparser-2.21-py2.py3-none-any.whl (118 kB) Using legacy 'setup.py install' for certreader, since package 'wheel' is not installed. Installing collected packages: pycparser, cffi, pyyaml, pyasn1, cryptography, certreader Running setup.py install for certreader: started Running setup.py install for certreader: finished with status 'done' Successfully installed certreader-0.1.1 cffi-1.15.0 cryptography-3.4.8 pyasn1-0.4.8 pycparser-2.21 pyyaml-6.0 TASK [Retrieve certificate file stats] ***************************************** ok: [sut] => { "changed": false, "stat": { "atime": 1649786197.384528, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "dad69de6e02668f441e5d54508369c5fc4232046", "ctime": 1649786197.381528, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 566193, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1649786197.381528, "nlink": 1, "path": "/etc/pki/tls/certs/mycert_many_self_signed.crt", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1310, "uid": 0, "version": "2908574022", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Verify if certificate file exists] *************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate file owner and group] ********************************* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate permissions] ****************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Retrieve key file stats] ************************************************* ok: [sut] => { "changed": false, "stat": { "atime": 1649786197.316529, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "1cd37d4ddb01a8273ec18058f0597ea3fb10b2b1", "ctime": 1649786197.381528, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 407546, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1649786197.381528, "nlink": 1, "path": "/etc/pki/tls/private/mycert_many_self_signed.key", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1704, "uid": 0, "version": "1979697825", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Verify if key file exists] *********************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify key file owner and group] ***************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Parse certificate] ******************************************************* ok: [sut] => { "changed": false, "cmd": [ "/tmp/certificate-tests-venv/bin/certreader2json", "/etc/pki/tls/certs/mycert_many_self_signed.crt" ], "delta": "0:00:00.315841", "end": "2022-04-12 17:56:52.901376", "rc": 0, "start": "2022-04-12 17:56:52.585535" } STDOUT: { "subject": [ { "name": "commonName", "oid": "2.5.4.3", "value": "www.example.com" } ], "extensions": { "keyUsage": { "value": [ "digital_signature", "key_encipherment" ], "critical": false }, "subjectAltName": { "value": [ { "name": "DNS", "value": "www.example.com" } ], "critical": false }, "extendedKeyUsage": { "value": [ { "name": "id-kp-serverAuth", "oid": "1.3.6.1.5.5.7.3.1" }, { "name": "id-kp-clientAuth", "oid": "1.3.6.1.5.5.7.3.2" } ], "critical": false }, "basicConstraints": { "value": { "ca": false }, "critical": true }, "subjectKeyIdentifier": { "value": "80:6E:B1:1E:78:C3:6E:59:7E:5F:FE:52:A8:26:7F:E5:5F:84:F1:52", "critical": false }, "authorityKeyIdentifier": { "value": "D7:E8:62:F7:A3:EC:2A:37:32:A8:4E:F3:39:9D:7C:68:5F:81:3B:58", "critical": false } }, "signature_algorithm": { "algorithm": "sha256WithRSAEncryption", "signature": "4B:AB:74:58:1B:7C:4C:25:A1:A7:C9:C3:3C:69:4A:DE:FA:85:B2:BE:07:18:3A:77:31:BA:CC:2E:B9:E3:FD:9F:18:47:21:3B:11:FF:EB:DB:53:ED:6B:46:8B:3A:8E:E6:F4:7C:8D:70:C0:5C:FB:DA:FE:6E:A5:47:CE:A9:D8:6F:D1:2A:98:87:65:58:7B:E3:95:35:37:F8:74:F6:5E:8E:ED:C2:24:07:56:0D:09:7B:62:F6:4A:14:8B:71:EA:44:0D:21:4C:74:E1:C7:0A:76:96:2B:E5:A7:35:73:61:0E:DF:EB:F8:F3:B1:EB:92:07:F4:75:DC:EC:64:23:72:85:FD:CA:E1:11:2F:F8:37:D1:EE:CA:14:D1:5D:83:8A:C7:62:A4:31:93:0D:96:63:EA:41:BD:F0:78:9C:F3:0D:42:9F:BA:E5:94:67:D7:2C:B5:8B:2E:5A:5F:F8:29:20:17:4C:1A:E2:89:82:E7:06:B3:52:43:E1:CC:3C:DF:DA:2C:18:0B:65:09:9C:D5:AA:1B:F7:69:49:33:72:C3:88:96:9A:AE:8E:2F:7D:36:83:C0:54:C1:CD:80:BF:2D:2A:A4:7B:02:E5:01:29:21:7B:86:29:10:48:E1:72:06:51:09:40:88:CC:EB:9A:E9:8A:92:B9:4F:D5:A0:0B:81:E5:98" }, "key_size": 2048, "validity": { "not_valid_after": "2023-04-12 17:56:36", "not_valid_before": "2022-04-12 17:56:37" } } TASK [Load certificate YAML to cert_issued variable] *************************** ok: [sut] => { "ansible_facts": { "cert_issued": { "extensions": { "authorityKeyIdentifier": { "critical": false, "value": "D7:E8:62:F7:A3:EC:2A:37:32:A8:4E:F3:39:9D:7C:68:5F:81:3B:58" }, "basicConstraints": { "critical": true, "value": { "ca": false } }, "extendedKeyUsage": { "critical": false, "value": [ { "name": "id-kp-serverAuth", "oid": "1.3.6.1.5.5.7.3.1" }, { "name": "id-kp-clientAuth", "oid": "1.3.6.1.5.5.7.3.2" } ] }, "keyUsage": { "critical": false, "value": [ "digital_signature", "key_encipherment" ] }, "subjectAltName": { "critical": false, "value": [ { "name": "DNS", "value": "www.example.com" } ] }, "subjectKeyIdentifier": { "critical": false, "value": "80:6E:B1:1E:78:C3:6E:59:7E:5F:FE:52:A8:26:7F:E5:5F:84:F1:52" } }, "key_size": 2048, "signature_algorithm": { "algorithm": "sha256WithRSAEncryption", "signature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}, "subject": [ { "name": "commonName", "oid": "2.5.4.3", "value": "www.example.com" } ], "validity": { "not_valid_after": "2023-04-12 17:56:36", "not_valid_before": "2022-04-12 17:56:37" } } }, "changed": false } TASK [Verify certificate subject] ********************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate SAN] ************************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify key size] ********************************************************* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate Key Usage] ******************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate Extended Key Usage] *********************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Retrieve auto-renew flag] ************************************************ ok: [sut] => { "changed": false, "cmd": "set -euo pipefail; getcert list -f /etc/pki/tls/certs/mycert_many_self_signed.crt | grep 'auto-renew' | sed 's/^\\s\\+auto-renew: //g'", "delta": "0:00:00.067065", "end": "2022-04-12 17:56:53.551460", "rc": 0, "start": "2022-04-12 17:56:53.484395" } STDOUT: yes TASK [Verify certificate auto-renew flag] ************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Set virtualenv_path] ***************************************************** ok: [sut] => { "ansible_facts": { "__virtualenv_path": "/tmp/certificate-tests-venv" }, "changed": false } TASK [Ensure python3 is installed] ********************************************* ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do TASK [Install the package, force upgrade] ************************************** ok: [sut] => { "changed": false, "cmd": [ "/tmp/certificate-tests-venv/bin/pip3", "install", "-U", "pip" ], "name": [ "pip" ], "requirements": null, "state": "latest", "version": null, "virtualenv": "/tmp/certificate-tests-venv" } STDOUT: Requirement already satisfied: pip in ./certificate-tests-venv/lib/python3.6/site-packages (21.3.1) TASK [Install certreader] ****************************************************** ok: [sut] => { "changed": false, "cmd": [ "/tmp/certificate-tests-venv/bin/pip3", "install", "cryptography<35", "certreader>=0.1.1" ], "name": [ "cryptography<35", "certreader>=0.1.1" ], "requirements": null, "state": "present", "version": null, "virtualenv": "/tmp/certificate-tests-venv" } STDOUT: Requirement already satisfied: cryptography<35 in ./certificate-tests-venv/lib/python3.6/site-packages (3.4.8) Requirement already satisfied: certreader>=0.1.1 in ./certificate-tests-venv/lib/python3.6/site-packages (0.1.1) Requirement already satisfied: cffi>=1.12 in ./certificate-tests-venv/lib/python3.6/site-packages (from cryptography<35) (1.15.0) Requirement already satisfied: pyasn1 in ./certificate-tests-venv/lib/python3.6/site-packages (from certreader>=0.1.1) (0.4.8) Requirement already satisfied: pyyaml in ./certificate-tests-venv/lib/python3.6/site-packages (from certreader>=0.1.1) (6.0) Requirement already satisfied: pycparser in ./certificate-tests-venv/lib/python3.6/site-packages (from cffi>=1.12->cryptography<35) (2.21) TASK [Retrieve certificate file stats] ***************************************** ok: [sut] => { "changed": false, "stat": { "atime": 1649786199.0794961, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "a1bbd576a73cb157dd51f0b01353ab5c28d11e7f", "ctime": 1649786199.0764961, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 566195, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1649786199.0764961, "nlink": 1, "path": "/etc/pki/tls/certs/other-cert.crt", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1310, "uid": 0, "version": "3702707460", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Verify if certificate file exists] *************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate file owner and group] ********************************* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate permissions] ****************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Retrieve key file stats] ************************************************* ok: [sut] => { "changed": false, "stat": { "atime": 1649786199.0214972, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "2eecfcb671f1afa166ce33cc8e1cf1d72f0fe769", "ctime": 1649786199.0764961, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 566194, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1649786199.0764961, "nlink": 1, "path": "/etc/pki/tls/private/other-cert.key", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1704, "uid": 0, "version": "1517575910", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Verify if key file exists] *********************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify key file owner and group] ***************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Parse certificate] ******************************************************* ok: [sut] => { "changed": false, "cmd": [ "/tmp/certificate-tests-venv/bin/certreader2json", "/etc/pki/tls/certs/other-cert.crt" ], "delta": "0:00:00.313618", "end": "2022-04-12 17:56:58.424345", "rc": 0, "start": "2022-04-12 17:56:58.110727" } STDOUT: { "subject": [ { "name": "commonName", "oid": "2.5.4.3", "value": "www.example.org" } ], "extensions": { "keyUsage": { "value": [ "digital_signature", "key_encipherment" ], "critical": false }, "subjectAltName": { "value": [ { "name": "DNS", "value": "www.example.org" } ], "critical": false }, "extendedKeyUsage": { "value": [ { "name": "id-kp-serverAuth", "oid": "1.3.6.1.5.5.7.3.1" }, { "name": "id-kp-clientAuth", "oid": "1.3.6.1.5.5.7.3.2" } ], "critical": false }, "basicConstraints": { "value": { "ca": false }, "critical": true }, "subjectKeyIdentifier": { "value": "76:76:00:A0:35:95:EF:69:CC:0E:3D:E9:F5:E8:18:D3:BA:79:EE:89", "critical": false }, "authorityKeyIdentifier": { "value": "D7:E8:62:F7:A3:EC:2A:37:32:A8:4E:F3:39:9D:7C:68:5F:81:3B:58", "critical": false } }, "signature_algorithm": { "algorithm": "sha256WithRSAEncryption", "signature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}, "key_size": 2048, "validity": { "not_valid_after": "2023-04-12 17:56:36", "not_valid_before": "2022-04-12 17:56:39" } } TASK [Load certificate YAML to cert_issued variable] *************************** ok: [sut] => { "ansible_facts": { "cert_issued": { "extensions": { "authorityKeyIdentifier": { "critical": false, "value": "D7:E8:62:F7:A3:EC:2A:37:32:A8:4E:F3:39:9D:7C:68:5F:81:3B:58" }, "basicConstraints": { "critical": true, "value": { "ca": false } }, "extendedKeyUsage": { "critical": false, "value": [ { "name": "id-kp-serverAuth", "oid": "1.3.6.1.5.5.7.3.1" }, { "name": "id-kp-clientAuth", "oid": "1.3.6.1.5.5.7.3.2" } ] }, "keyUsage": { "critical": false, "value": [ "digital_signature", "key_encipherment" ] }, "subjectAltName": { "critical": false, "value": [ { "name": "DNS", "value": "www.example.org" } ] }, "subjectKeyIdentifier": { "critical": false, "value": "76:76:00:A0:35:95:EF:69:CC:0E:3D:E9:F5:E8:18:D3:BA:79:EE:89" } }, "key_size": 2048, "signature_algorithm": { "algorithm": "sha256WithRSAEncryption", "signature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}, "subject": [ { "name": "commonName", "oid": "2.5.4.3", "value": "www.example.org" } ], "validity": { "not_valid_after": "2023-04-12 17:56:36", "not_valid_before": "2022-04-12 17:56:39" } } }, "changed": false } TASK [Verify certificate subject] ********************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate SAN] ************************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify key size] ********************************************************* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate Key Usage] ******************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate Extended Key Usage] *********************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Retrieve auto-renew flag] ************************************************ ok: [sut] => { "changed": false, "cmd": "set -euo pipefail; getcert list -f /etc/pki/tls/certs/other-cert.crt | grep 'auto-renew' | sed 's/^\\s\\+auto-renew: //g'", "delta": "0:00:00.066708", "end": "2022-04-12 17:56:59.032424", "rc": 0, "start": "2022-04-12 17:56:58.965716" } STDOUT: yes TASK [Verify certificate auto-renew flag] ************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Set virtualenv_path] ***************************************************** ok: [sut] => { "ansible_facts": { "__virtualenv_path": "/tmp/certificate-tests-venv" }, "changed": false } TASK [Ensure python3 is installed] ********************************************* ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do TASK [Install the package, force upgrade] ************************************** ok: [sut] => { "changed": false, "cmd": [ "/tmp/certificate-tests-venv/bin/pip3", "install", "-U", "pip" ], "name": [ "pip" ], "requirements": null, "state": "latest", "version": null, "virtualenv": "/tmp/certificate-tests-venv" } STDOUT: Requirement already satisfied: pip in ./certificate-tests-venv/lib/python3.6/site-packages (21.3.1) TASK [Install certreader] ****************************************************** ok: [sut] => { "changed": false, "cmd": [ "/tmp/certificate-tests-venv/bin/pip3", "install", "cryptography<35", "certreader>=0.1.1" ], "name": [ "cryptography<35", "certreader>=0.1.1" ], "requirements": null, "state": "present", "version": null, "virtualenv": "/tmp/certificate-tests-venv" } STDOUT: Requirement already satisfied: cryptography<35 in ./certificate-tests-venv/lib/python3.6/site-packages (3.4.8) Requirement already satisfied: certreader>=0.1.1 in ./certificate-tests-venv/lib/python3.6/site-packages (0.1.1) Requirement already satisfied: cffi>=1.12 in ./certificate-tests-venv/lib/python3.6/site-packages (from cryptography<35) (1.15.0) Requirement already satisfied: pyasn1 in ./certificate-tests-venv/lib/python3.6/site-packages (from certreader>=0.1.1) (0.4.8) Requirement already satisfied: pyyaml in ./certificate-tests-venv/lib/python3.6/site-packages (from certreader>=0.1.1) (6.0) Requirement already satisfied: pycparser in ./certificate-tests-venv/lib/python3.6/site-packages (from cffi>=1.12->cryptography<35) (2.21) TASK [Retrieve certificate file stats] ***************************************** ok: [sut] => { "changed": false, "stat": { "atime": 1649786199.659485, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "fd687dac3000a8b81b49a06b7ee74dba28e3ebef", "ctime": 1649786199.6554854, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 566197, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1649786199.6554854, "nlink": 1, "path": "/etc/pki/tls/certs/another-cert.crt", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1310, "uid": 0, "version": "377051663", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Verify if certificate file exists] *************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate file owner and group] ********************************* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate permissions] ****************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Retrieve key file stats] ************************************************* ok: [sut] => { "changed": false, "stat": { "atime": 1649786199.6024864, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "6406d9f499a34ce9aa59b2a056e059fdca194212", "ctime": 1649786199.6554854, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 566196, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1649786199.6554854, "nlink": 1, "path": "/etc/pki/tls/private/another-cert.key", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1704, "uid": 0, "version": "1356585103", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Verify if key file exists] *********************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify key file owner and group] ***************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Parse certificate] ******************************************************* ok: [sut] => { "changed": false, "cmd": [ "/tmp/certificate-tests-venv/bin/certreader2json", "/etc/pki/tls/certs/another-cert.crt" ], "delta": "0:00:00.313944", "end": "2022-04-12 17:57:04.035864", "rc": 0, "start": "2022-04-12 17:57:03.721920" } STDOUT: { "subject": [ { "name": "commonName", "oid": "2.5.4.3", "value": "www.example.net" } ], "extensions": { "keyUsage": { "value": [ "digital_signature", "key_encipherment" ], "critical": false }, "subjectAltName": { "value": [ { "name": "DNS", "value": "www.example.net" } ], "critical": false }, "extendedKeyUsage": { "value": [ { "name": "id-kp-serverAuth", "oid": "1.3.6.1.5.5.7.3.1" }, { "name": "id-kp-clientAuth", "oid": "1.3.6.1.5.5.7.3.2" } ], "critical": false }, "basicConstraints": { "value": { "ca": false }, "critical": true }, "subjectKeyIdentifier": { "value": "95:6C:DB:4E:7D:C3:03:30:DB:21:94:8C:F1:85:69:31:AB:7B:2C:2A", "critical": false }, "authorityKeyIdentifier": { "value": "D7:E8:62:F7:A3:EC:2A:37:32:A8:4E:F3:39:9D:7C:68:5F:81:3B:58", "critical": false } }, "signature_algorithm": { "algorithm": "sha256WithRSAEncryption", "signature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}, "key_size": 2048, "validity": { "not_valid_after": "2023-04-12 17:56:36", "not_valid_before": "2022-04-12 17:56:39" } } TASK [Load certificate YAML to cert_issued variable] *************************** ok: [sut] => { "ansible_facts": { "cert_issued": { "extensions": { "authorityKeyIdentifier": { "critical": false, "value": "D7:E8:62:F7:A3:EC:2A:37:32:A8:4E:F3:39:9D:7C:68:5F:81:3B:58" }, "basicConstraints": { "critical": true, "value": { "ca": false } }, "extendedKeyUsage": { "critical": false, "value": [ { "name": "id-kp-serverAuth", "oid": "1.3.6.1.5.5.7.3.1" }, { "name": "id-kp-clientAuth", "oid": "1.3.6.1.5.5.7.3.2" } ] }, "keyUsage": { "critical": false, "value": [ "digital_signature", "key_encipherment" ] }, "subjectAltName": { "critical": false, "value": [ { "name": "DNS", "value": "www.example.net" } ] }, "subjectKeyIdentifier": { "critical": false, "value": "95:6C:DB:4E:7D:C3:03:30:DB:21:94:8C:F1:85:69:31:AB:7B:2C:2A" } }, "key_size": 2048, "signature_algorithm": { "algorithm": "sha256WithRSAEncryption", "signature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}, "subject": [ { "name": "commonName", "oid": "2.5.4.3", "value": "www.example.net" } ], "validity": { "not_valid_after": "2023-04-12 17:56:36", "not_valid_before": "2022-04-12 17:56:39" } } }, "changed": false } TASK [Verify certificate subject] ********************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate SAN] ************************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify key size] ********************************************************* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate Key Usage] ******************************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Verify certificate Extended Key Usage] *********************************** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Retrieve auto-renew flag] ************************************************ ok: [sut] => { "changed": false, "cmd": "set -euo pipefail; getcert list -f /etc/pki/tls/certs/another-cert.crt | grep 'auto-renew' | sed 's/^\\s\\+auto-renew: //g'", "delta": "0:00:00.067325", "end": "2022-04-12 17:57:04.730418", "rc": 0, "start": "2022-04-12 17:57:04.663093" } STDOUT: yes TASK [Verify certificate auto-renew flag] ************************************** ok: [sut] => { "changed": false } MSG: All assertions passed PLAY RECAP ********************************************************************* sut : ok=73 changed=8 unreachable=0 failed=0 skipped=1 rescued=0 ignored=0 ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- ---^---^---^---^---^---