# STDOUT: ---v---v---v---v---v--- ansible-playbook 2.9.27 config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.9/lib/python3.9/site-packages/ansible executable location = /opt/ansible-2.9/bin/ansible-playbook python version = 3.9.18 (main, Sep 7 2023, 00:00:00) [GCC 11.4.1 20230605 (Red Hat 11.4.1-2)] Using /etc/ansible/ansible.cfg as config file Skipping callback 'actionable', as we already have a stdout callback. Skipping callback 'counter_enabled', as we already have a stdout callback. Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'full_skip', as we already have a stdout callback. Skipping callback 'json', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'null', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. Skipping callback 'selective', as we already have a stdout callback. Skipping callback 'skippy', as we already have a stdout callback. Skipping callback 'stderr', as we already have a stdout callback. Skipping callback 'unixy', as we already have a stdout callback. Skipping callback 'yaml', as we already have a stdout callback. PLAYBOOK: tests_zone.yml ******************************************************* 1 plays in /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml PLAY [Test firewalld zones] **************************************************** TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:2 Saturday 20 January 2024 05:48:44 +0000 (0:00:00.012) 0:00:00.012 ****** ok: [sut] META: ran handlers TASK [Verify used firewalld zones] ********************************************* task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:15 Saturday 20 January 2024 05:48:44 +0000 (0:00:00.510) 0:00:00.522 ****** TASK [linux-system-roles.firewall : Setup firewalld] *************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:2 Saturday 20 January 2024 05:48:44 +0000 (0:00:00.048) 0:00:00.571 ****** included: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml for sut TASK [linux-system-roles.firewall : Ensure ansible_facts used by role] ********* task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:2 Saturday 20 January 2024 05:48:44 +0000 (0:00:00.027) 0:00:00.599 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Check if system is ostree] ***************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:11 Saturday 20 January 2024 05:48:45 +0000 (0:00:00.030) 0:00:00.629 ****** ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [linux-system-roles.firewall : Set flag to indicate system is ostree] ***** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:16 Saturday 20 January 2024 05:48:45 +0000 (0:00:00.191) 0:00:00.820 ****** ok: [sut] => { "ansible_facts": { "__firewall_is_ostree": false }, "changed": false } TASK [linux-system-roles.firewall : Install firewalld] ************************* task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:20 Saturday 20 January 2024 05:48:45 +0000 (0:00:00.021) 0:00:00.841 ****** ok: [sut] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [linux-system-roles.firewall : Collect service facts] ********************* task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:5 Saturday 20 January 2024 05:48:45 +0000 (0:00:00.460) 0:00:01.301 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:9 Saturday 20 January 2024 05:48:45 +0000 (0:00:00.038) 0:00:01.340 ****** skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "item": "ufw", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Unmask firewalld service] ****************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:23 Saturday 20 January 2024 05:48:45 +0000 (0:00:00.027) 0:00:01.368 ****** ok: [sut] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Sat 2024-01-20 05:47:31 UTC", "ActiveEnterTimestampMonotonic": "1182666668", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "basic.target system.slice dbus.service polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-01-20 05:47:30 UTC", "AssertTimestampMonotonic": "1181988870", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-01-20 05:47:30 UTC", "ConditionTimestampMonotonic": "1181988868", "Conflicts": "iptables.service ebtables.service shutdown.target ip6tables.service ipset.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11859", "ExecMainStartTimestamp": "Sat 2024-01-20 05:47:30 UTC", "ExecMainStartTimestampMonotonic": "1181991454", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-01-20 05:47:30 UTC] ; stop_time=[n/a] ; pid=11859 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-01-20 05:47:30 UTC", "InactiveExitTimestampMonotonic": "1181991493", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11859", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-01-20 05:47:31 UTC", "WatchdogTimestampMonotonic": "1182666478", "WatchdogUSec": "0" } } TASK [linux-system-roles.firewall : Enable and start firewalld service] ******** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:29 Saturday 20 January 2024 05:48:46 +0000 (0:00:00.322) 0:00:01.691 ****** ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Sat 2024-01-20 05:47:31 UTC", "ActiveEnterTimestampMonotonic": "1182666668", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "basic.target system.slice dbus.service polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-01-20 05:47:30 UTC", "AssertTimestampMonotonic": "1181988870", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-01-20 05:47:30 UTC", "ConditionTimestampMonotonic": "1181988868", "Conflicts": "iptables.service ebtables.service shutdown.target ip6tables.service ipset.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11859", "ExecMainStartTimestamp": "Sat 2024-01-20 05:47:30 UTC", "ExecMainStartTimestampMonotonic": "1181991454", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-01-20 05:47:30 UTC] ; stop_time=[n/a] ; pid=11859 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-01-20 05:47:30 UTC", "InactiveExitTimestampMonotonic": "1181991493", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11859", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-01-20 05:47:31 UTC", "WatchdogTimestampMonotonic": "1182666478", "WatchdogUSec": "0" } } TASK [linux-system-roles.firewall : Check if previous replaced is defined] ***** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:35 Saturday 20 January 2024 05:48:46 +0000 (0:00:00.199) 0:00:01.890 ****** ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python2", "__firewall_report_changed": true }, "changed": false } TASK [linux-system-roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:48 Saturday 20 January 2024 05:48:46 +0000 (0:00:00.022) 0:00:01.912 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:60 Saturday 20 January 2024 05:48:46 +0000 (0:00:00.018) 0:00:01.931 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Configure firewall] ************************ task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:77 Saturday 20 January 2024 05:48:46 +0000 (0:00:00.018) 0:00:01.949 ****** ok: [sut] => (item={'zone': 'internal', 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "state": "enabled", "zone": "internal" } } ok: [sut] => (item={'zone': 'external', 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "state": "enabled", "zone": "external" } } ok: [sut] => (item={'zone': 'trusted', 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "state": "enabled", "zone": "trusted" } } TASK [linux-system-roles.firewall : Gather firewall config information] ******** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:129 Saturday 20 January 2024 05:48:47 +0000 (0:00:01.197) 0:00:03.146 ****** skipping: [sut] => (item={'zone': 'internal', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "state": "enabled", "zone": "internal" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'external', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "state": "enabled", "zone": "external" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'trusted', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "state": "enabled", "zone": "trusted" }, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Update firewalld_config fact] ************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:140 Saturday 20 January 2024 05:48:47 +0000 (0:00:00.033) 0:00:03.179 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Gather firewall config if no arguments] **** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:149 Saturday 20 January 2024 05:48:47 +0000 (0:00:00.019) 0:00:03.199 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Update firewalld_config fact] ************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:154 Saturday 20 January 2024 05:48:47 +0000 (0:00:00.019) 0:00:03.218 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Get config files, checksums after] ********* task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:163 Saturday 20 January 2024 05:48:47 +0000 (0:00:00.018) 0:00:03.236 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Calculate what has changed] **************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:173 Saturday 20 January 2024 05:48:47 +0000 (0:00:00.019) 0:00:03.256 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Show diffs] ******************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:182 Saturday 20 January 2024 05:48:47 +0000 (0:00:00.019) 0:00:03.275 ****** skipping: [sut] => {} TASK [Fail on missing zones] *************************************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:27 Saturday 20 January 2024 05:48:47 +0000 (0:00:00.018) 0:00:03.293 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Setup firewalld] ********************************************************* task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:34 Saturday 20 January 2024 05:48:47 +0000 (0:00:00.019) 0:00:03.313 ****** TASK [linux-system-roles.firewall : Setup firewalld] *************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:2 Saturday 20 January 2024 05:48:47 +0000 (0:00:00.035) 0:00:03.348 ****** included: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml for sut TASK [linux-system-roles.firewall : Ensure ansible_facts used by role] ********* task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:2 Saturday 20 January 2024 05:48:47 +0000 (0:00:00.023) 0:00:03.371 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Check if system is ostree] ***************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:11 Saturday 20 January 2024 05:48:47 +0000 (0:00:00.019) 0:00:03.391 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Set flag to indicate system is ostree] ***** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:16 Saturday 20 January 2024 05:48:47 +0000 (0:00:00.017) 0:00:03.409 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Install firewalld] ************************* task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:20 Saturday 20 January 2024 05:48:47 +0000 (0:00:00.018) 0:00:03.427 ****** ok: [sut] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [linux-system-roles.firewall : Collect service facts] ********************* task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:5 Saturday 20 January 2024 05:48:48 +0000 (0:00:00.385) 0:00:03.812 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:9 Saturday 20 January 2024 05:48:48 +0000 (0:00:00.022) 0:00:03.835 ****** skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "item": "ufw", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Unmask firewalld service] ****************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:23 Saturday 20 January 2024 05:48:48 +0000 (0:00:00.028) 0:00:03.863 ****** ok: [sut] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Sat 2024-01-20 05:47:31 UTC", "ActiveEnterTimestampMonotonic": "1182666668", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "basic.target system.slice dbus.service polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-01-20 05:47:30 UTC", "AssertTimestampMonotonic": "1181988870", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-01-20 05:47:30 UTC", "ConditionTimestampMonotonic": "1181988868", "Conflicts": "iptables.service ebtables.service shutdown.target ip6tables.service ipset.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11859", "ExecMainStartTimestamp": "Sat 2024-01-20 05:47:30 UTC", "ExecMainStartTimestampMonotonic": "1181991454", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-01-20 05:47:30 UTC] ; stop_time=[n/a] ; pid=11859 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-01-20 05:47:30 UTC", "InactiveExitTimestampMonotonic": "1181991493", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11859", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-01-20 05:47:31 UTC", "WatchdogTimestampMonotonic": "1182666478", "WatchdogUSec": "0" } } TASK [linux-system-roles.firewall : Enable and start firewalld service] ******** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:29 Saturday 20 January 2024 05:48:48 +0000 (0:00:00.206) 0:00:04.069 ****** ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Sat 2024-01-20 05:47:31 UTC", "ActiveEnterTimestampMonotonic": "1182666668", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "basic.target system.slice dbus.service polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-01-20 05:47:30 UTC", "AssertTimestampMonotonic": "1181988870", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-01-20 05:47:30 UTC", "ConditionTimestampMonotonic": "1181988868", "Conflicts": "iptables.service ebtables.service shutdown.target ip6tables.service ipset.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11859", "ExecMainStartTimestamp": "Sat 2024-01-20 05:47:30 UTC", "ExecMainStartTimestampMonotonic": "1181991454", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-01-20 05:47:30 UTC] ; stop_time=[n/a] ; pid=11859 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-01-20 05:47:30 UTC", "InactiveExitTimestampMonotonic": "1181991493", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11859", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-01-20 05:47:31 UTC", "WatchdogTimestampMonotonic": "1182666478", "WatchdogUSec": "0" } } TASK [linux-system-roles.firewall : Check if previous replaced is defined] ***** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:35 Saturday 20 January 2024 05:48:48 +0000 (0:00:00.216) 0:00:04.286 ****** ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": true, "__firewall_python_cmd": "/usr/bin/python2", "__firewall_report_changed": true }, "changed": false } TASK [linux-system-roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:48 Saturday 20 January 2024 05:48:48 +0000 (0:00:00.026) 0:00:04.313 ****** ok: [sut] => { "changed": false, "rc": 0 } STDERR: Shared connection to 10.31.10.6 closed. TASK [linux-system-roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:60 Saturday 20 January 2024 05:48:48 +0000 (0:00:00.277) 0:00:04.590 ****** ok: [sut] => { "ansible_facts": { "__firewall_report_changed": true }, "changed": false } TASK [linux-system-roles.firewall : Configure firewall] ************************ task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:77 Saturday 20 January 2024 05:48:49 +0000 (0:00:00.021) 0:00:04.612 ****** changed: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "__firewall_changed": true, "ansible_loop_var": "item", "changed": true, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" } } ok: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" } } changed: [sut] => (item={'zone': 'customzone', 'permanent': True, 'state': 'present'}) => { "__firewall_changed": true, "ansible_loop_var": "item", "changed": true, "item": { "permanent": true, "state": "present", "zone": "customzone" } } changed: [sut] => (item={'zone': 'customzone', 'permanent': True, 'masquerade': True, 'state': 'enabled'}) => { "__firewall_changed": true, "ansible_loop_var": "item", "changed": true, "item": { "masquerade": true, "permanent": true, "state": "enabled", "zone": "customzone" } } changed: [sut] => (item={'set_default_zone': 'dmz', 'state': 'enabled'}) => { "__firewall_changed": true, "ansible_loop_var": "item", "changed": true, "item": { "set_default_zone": "dmz", "state": "enabled" } } changed: [sut] => (item={'service': 'http', 'state': 'enabled'}) => { "__firewall_changed": true, "ansible_loop_var": "item", "changed": true, "item": { "service": "http", "state": "enabled" } } TASK [linux-system-roles.firewall : Gather firewall config information] ******** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:129 Saturday 20 January 2024 05:48:51 +0000 (0:00:02.622) 0:00:07.234 ****** skipping: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'customzone', 'permanent': True, 'state': 'present'}) => { "ansible_loop_var": "item", "changed": false, "item": { "permanent": true, "state": "present", "zone": "customzone" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'customzone', 'permanent': True, 'masquerade': True, 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "masquerade": true, "permanent": true, "state": "enabled", "zone": "customzone" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'set_default_zone': 'dmz', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "set_default_zone": "dmz", "state": "enabled" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'service': 'http', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "service": "http", "state": "enabled" }, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Update firewalld_config fact] ************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:140 Saturday 20 January 2024 05:48:51 +0000 (0:00:00.047) 0:00:07.282 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Gather firewall config if no arguments] **** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:149 Saturday 20 January 2024 05:48:51 +0000 (0:00:00.019) 0:00:07.301 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Update firewalld_config fact] ************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:154 Saturday 20 January 2024 05:48:51 +0000 (0:00:00.017) 0:00:07.319 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Get config files, checksums after] ********* task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:163 Saturday 20 January 2024 05:48:51 +0000 (0:00:00.017) 0:00:07.337 ****** ok: [sut] => { "changed": false, "rc": 0 } STDOUT: 610e6e9bafe289c126adb751e772cd0224012f12738a8b8011454b1da8865c18 /etc/firewalld/zones/customzone.xml df2e066f9b8c0677c4887aa9a7032c4f94480408ff740036d98e648d11dd84c5 /etc/firewalld/zones/dmz.xml e2b071ca9b919b8fd60a4fe1e00e4f792ec2245359e8c48027020970791176d1 /etc/firewalld/zones/internal.xml 958dce439fe299ce0b0fdb10c4c18412269fbab3f09660e4b210962728554953 /etc/firewalld/firewalld.conf STDERR: Shared connection to 10.31.10.6 closed. TASK [linux-system-roles.firewall : Calculate what has changed] **************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:173 Saturday 20 January 2024 05:48:52 +0000 (0:00:00.324) 0:00:07.661 ****** changed: [sut] => { "ansible_facts": { "firewall_lib_result": { "changed": true } }, "changed": true } TASK [linux-system-roles.firewall : Show diffs] ******************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:182 Saturday 20 January 2024 05:48:52 +0000 (0:00:00.028) 0:00:07.690 ****** skipping: [sut] => {} TASK [Fail if no changes are done] ********************************************* task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:64 Saturday 20 January 2024 05:48:52 +0000 (0:00:00.020) 0:00:07.711 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Setup firewalld again] *************************************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:71 Saturday 20 January 2024 05:48:52 +0000 (0:00:00.017) 0:00:07.729 ****** TASK [linux-system-roles.firewall : Setup firewalld] *************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:2 Saturday 20 January 2024 05:48:52 +0000 (0:00:00.033) 0:00:07.762 ****** included: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml for sut TASK [linux-system-roles.firewall : Ensure ansible_facts used by role] ********* task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:2 Saturday 20 January 2024 05:48:52 +0000 (0:00:00.021) 0:00:07.784 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Check if system is ostree] ***************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:11 Saturday 20 January 2024 05:48:52 +0000 (0:00:00.019) 0:00:07.803 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Set flag to indicate system is ostree] ***** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:16 Saturday 20 January 2024 05:48:52 +0000 (0:00:00.017) 0:00:07.821 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Install firewalld] ************************* task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:20 Saturday 20 January 2024 05:48:52 +0000 (0:00:00.017) 0:00:07.839 ****** ok: [sut] => { "changed": false, "rc": 0, "results": [ "firewalld-0.6.3-13.el7_9.noarch providing firewalld is already installed" ] } lsrpackages: firewalld TASK [linux-system-roles.firewall : Collect service facts] ********************* task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:5 Saturday 20 January 2024 05:48:52 +0000 (0:00:00.381) 0:00:08.220 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Attempt to stop and disable conflicting services] *** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:9 Saturday 20 January 2024 05:48:52 +0000 (0:00:00.019) 0:00:08.239 ****** skipping: [sut] => (item=nftables) => { "ansible_loop_var": "item", "changed": false, "item": "nftables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=iptables) => { "ansible_loop_var": "item", "changed": false, "item": "iptables", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=ufw) => { "ansible_loop_var": "item", "changed": false, "item": "ufw", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Unmask firewalld service] ****************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:23 Saturday 20 January 2024 05:48:52 +0000 (0:00:00.026) 0:00:08.266 ****** ok: [sut] => { "changed": false, "name": "firewalld", "status": { "ActiveEnterTimestamp": "Sat 2024-01-20 05:47:31 UTC", "ActiveEnterTimestampMonotonic": "1182666668", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "basic.target system.slice dbus.service polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-01-20 05:47:30 UTC", "AssertTimestampMonotonic": "1181988870", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-01-20 05:47:30 UTC", "ConditionTimestampMonotonic": "1181988868", "Conflicts": "iptables.service ebtables.service shutdown.target ip6tables.service ipset.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11859", "ExecMainStartTimestamp": "Sat 2024-01-20 05:47:30 UTC", "ExecMainStartTimestampMonotonic": "1181991454", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-01-20 05:47:30 UTC] ; stop_time=[n/a] ; pid=11859 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-01-20 05:47:30 UTC", "InactiveExitTimestampMonotonic": "1181991493", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11859", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-01-20 05:47:31 UTC", "WatchdogTimestampMonotonic": "1182666478", "WatchdogUSec": "0" } } TASK [linux-system-roles.firewall : Enable and start firewalld service] ******** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:29 Saturday 20 January 2024 05:48:52 +0000 (0:00:00.206) 0:00:08.473 ****** ok: [sut] => { "changed": false, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "Sat 2024-01-20 05:47:31 UTC", "ActiveEnterTimestampMonotonic": "1182666668", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "basic.target system.slice dbus.service polkit.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Sat 2024-01-20 05:47:30 UTC", "AssertTimestampMonotonic": "1181988870", "Before": "network-pre.target shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Sat 2024-01-20 05:47:30 UTC", "ConditionTimestampMonotonic": "1181988868", "Conflicts": "iptables.service ebtables.service shutdown.target ip6tables.service ipset.service", "ControlGroup": "/system.slice/firewalld.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "man:firewalld(1)", "EnvironmentFile": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "11859", "ExecMainStartTimestamp": "Sat 2024-01-20 05:47:30 UTC", "ExecMainStartTimestampMonotonic": "1181991454", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[Sat 2024-01-20 05:47:30 UTC] ; stop_time=[n/a] ; pid=11859 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Sat 2024-01-20 05:47:30 UTC", "InactiveExitTimestampMonotonic": "1181991493", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "14311", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "14311", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "11859", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice basic.target", "Restart": "no", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "network-pre.target", "WatchdogTimestamp": "Sat 2024-01-20 05:47:31 UTC", "WatchdogTimestampMonotonic": "1182666478", "WatchdogUSec": "0" } } TASK [linux-system-roles.firewall : Check if previous replaced is defined] ***** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:35 Saturday 20 January 2024 05:48:53 +0000 (0:00:00.201) 0:00:08.674 ****** ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": true, "__firewall_python_cmd": "/usr/bin/python2", "__firewall_report_changed": true }, "changed": false } TASK [linux-system-roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:48 Saturday 20 January 2024 05:48:53 +0000 (0:00:00.021) 0:00:08.696 ****** ok: [sut] => { "changed": false, "rc": 0 } STDOUT: 610e6e9bafe289c126adb751e772cd0224012f12738a8b8011454b1da8865c18 /etc/firewalld/zones/customzone.xml df2e066f9b8c0677c4887aa9a7032c4f94480408ff740036d98e648d11dd84c5 /etc/firewalld/zones/dmz.xml e2b071ca9b919b8fd60a4fe1e00e4f792ec2245359e8c48027020970791176d1 /etc/firewalld/zones/internal.xml 958dce439fe299ce0b0fdb10c4c18412269fbab3f09660e4b210962728554953 /etc/firewalld/firewalld.conf STDERR: Shared connection to 10.31.10.6 closed. TASK [linux-system-roles.firewall : Tell firewall module it is able to report changed] *** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:60 Saturday 20 January 2024 05:48:53 +0000 (0:00:00.877) 0:00:09.573 ****** ok: [sut] => { "ansible_facts": { "__firewall_report_changed": false }, "changed": false } TASK [linux-system-roles.firewall : Configure firewall] ************************ task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:77 Saturday 20 January 2024 05:48:53 +0000 (0:00:00.020) 0:00:09.594 ****** ok: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" } } ok: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" } } ok: [sut] => (item={'zone': 'customzone', 'permanent': True, 'state': 'present'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "permanent": true, "state": "present", "zone": "customzone" } } ok: [sut] => (item={'zone': 'customzone', 'permanent': True, 'masquerade': True, 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "masquerade": true, "permanent": true, "state": "enabled", "zone": "customzone" } } ok: [sut] => (item={'set_default_zone': 'dmz', 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "set_default_zone": "dmz", "state": "enabled" } } ok: [sut] => (item={'service': 'http', 'state': 'enabled'}) => { "__firewall_changed": false, "ansible_loop_var": "item", "changed": false, "item": { "service": "http", "state": "enabled" } } TASK [linux-system-roles.firewall : Gather firewall config information] ******** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:129 Saturday 20 January 2024 05:48:56 +0000 (0:00:02.628) 0:00:12.222 ****** skipping: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'internal', 'service': ['tftp', 'ftp'], 'port': ['443/tcp', '443/udp'], 'forward_port': ['447/tcp;;1.2.3.4', '448/tcp;;1.2.3.5'], 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "forward_port": [ "447/tcp;;1.2.3.4", "448/tcp;;1.2.3.5" ], "port": [ "443/tcp", "443/udp" ], "service": [ "tftp", "ftp" ], "state": "enabled", "zone": "internal" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'customzone', 'permanent': True, 'state': 'present'}) => { "ansible_loop_var": "item", "changed": false, "item": { "permanent": true, "state": "present", "zone": "customzone" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'zone': 'customzone', 'permanent': True, 'masquerade': True, 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "masquerade": true, "permanent": true, "state": "enabled", "zone": "customzone" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'set_default_zone': 'dmz', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "set_default_zone": "dmz", "state": "enabled" }, "skip_reason": "Conditional result was False" } skipping: [sut] => (item={'service': 'http', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "service": "http", "state": "enabled" }, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Update firewalld_config fact] ************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:140 Saturday 20 January 2024 05:48:56 +0000 (0:00:00.046) 0:00:12.269 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Gather firewall config if no arguments] **** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:149 Saturday 20 January 2024 05:48:56 +0000 (0:00:00.019) 0:00:12.288 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Update firewalld_config fact] ************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:154 Saturday 20 January 2024 05:48:56 +0000 (0:00:00.019) 0:00:12.307 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.firewall : Get config files, checksums after] ********* task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:163 Saturday 20 January 2024 05:48:56 +0000 (0:00:00.019) 0:00:12.326 ****** ok: [sut] => { "changed": false, "rc": 0 } STDOUT: 610e6e9bafe289c126adb751e772cd0224012f12738a8b8011454b1da8865c18 /etc/firewalld/zones/customzone.xml df2e066f9b8c0677c4887aa9a7032c4f94480408ff740036d98e648d11dd84c5 /etc/firewalld/zones/dmz.xml e2b071ca9b919b8fd60a4fe1e00e4f792ec2245359e8c48027020970791176d1 /etc/firewalld/zones/internal.xml 958dce439fe299ce0b0fdb10c4c18412269fbab3f09660e4b210962728554953 /etc/firewalld/firewalld.conf STDERR: Shared connection to 10.31.10.6 closed. TASK [linux-system-roles.firewall : Calculate what has changed] **************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:173 Saturday 20 January 2024 05:48:57 +0000 (0:00:00.322) 0:00:12.648 ****** ok: [sut] => { "ansible_facts": { "firewall_lib_result": { "changed": false } }, "changed": false } TASK [linux-system-roles.firewall : Show diffs] ******************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:182 Saturday 20 January 2024 05:48:57 +0000 (0:00:00.023) 0:00:12.672 ****** skipping: [sut] => {} TASK [Fail on newly changes] *************************************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:101 Saturday 20 January 2024 05:48:57 +0000 (0:00:00.019) 0:00:12.692 ****** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Verify firewalld zone internal services] ********************************* task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:108 Saturday 20 January 2024 05:48:57 +0000 (0:00:00.020) 0:00:12.712 ****** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--permanent", "--zone=internal", "--list-services" ], "delta": "0:00:00.327840", "end": "2024-01-20 05:48:57.617510", "failed_when_result": false, "rc": 0, "start": "2024-01-20 05:48:57.289670" } STDOUT: dhcpv6-client ftp mdns samba-client ssh tftp TASK [Verify firewalld zone internal ports] ************************************ task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:116 Saturday 20 January 2024 05:48:57 +0000 (0:00:00.531) 0:00:13.244 ****** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--permanent", "--zone=internal", "--list-ports" ], "delta": "0:00:00.311032", "end": "2024-01-20 05:48:58.060646", "failed_when_result": false, "rc": 0, "start": "2024-01-20 05:48:57.749614" } STDOUT: 443/tcp 443/udp TASK [Verify firewalld zone internal forward ports] **************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:124 Saturday 20 January 2024 05:48:58 +0000 (0:00:00.443) 0:00:13.687 ****** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--permanent", "--zone=internal", "--list-forward-ports" ], "delta": "0:00:00.317165", "end": "2024-01-20 05:48:58.514618", "failed_when_result": false, "rc": 0, "start": "2024-01-20 05:48:58.197453" } STDOUT: port=447:proto=tcp:toport=:toaddr=1.2.3.4 port=448:proto=tcp:toport=:toaddr=1.2.3.5 TASK [Verify custom zone has masquerade added to it] *************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:134 Saturday 20 January 2024 05:48:58 +0000 (0:00:00.454) 0:00:14.141 ****** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--permanent", "--zone=customzone", "--query-masquerade" ], "delta": "0:00:00.313780", "end": "2024-01-20 05:48:58.962918", "failed_when_result": false, "rc": 0, "start": "2024-01-20 05:48:58.649138" } STDOUT: yes TASK [Verify custom zone has masquerade added to it] *************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:141 Saturday 20 January 2024 05:48:58 +0000 (0:00:00.447) 0:00:14.589 ****** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--get-default-zone" ], "delta": "0:00:00.304377", "end": "2024-01-20 05:48:59.402504", "failed_when_result": false, "rc": 0, "start": "2024-01-20 05:48:59.098127" } STDOUT: dmz TASK [Verify that service http has been added to the default zone dmz] ********* task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:148 Saturday 20 January 2024 05:48:59 +0000 (0:00:00.440) 0:00:15.029 ****** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--zone=dmz", "--query-service=http" ], "delta": "0:00:00.294055", "end": "2024-01-20 05:48:59.827223", "failed_when_result": false, "rc": 0, "start": "2024-01-20 05:48:59.533168" } STDOUT: yes TASK [Remove customzone zone] ************************************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:161 Saturday 20 January 2024 05:48:59 +0000 (0:00:00.425) 0:00:15.454 ****** ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--permanent", "--delete-zone=customzone" ], "delta": "0:00:00.308967", "end": "2024-01-20 05:49:00.269524", "failed_when_result": false, "rc": 0, "start": "2024-01-20 05:48:59.960557" } STDOUT: success TASK [Reset to zone defaults] ************************************************** task path: /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:167 Saturday 20 January 2024 05:49:00 +0000 (0:00:00.441) 0:00:15.895 ****** ok: [sut] => { "changed": false, "cmd": "firewall-cmd --permanent --load-zone-defaults=internal\nfirewall-cmd --permanent --load-zone-defaults=external\nfirewall-cmd --permanent --load-zone-defaults=trusted\nfirewall-cmd --reload\n", "delta": "0:00:01.533711", "end": "2024-01-20 05:49:01.935502", "rc": 0, "start": "2024-01-20 05:49:00.401791" } STDOUT: success success STDERR: Error: NO_DEFAULTS: external Error: NO_DEFAULTS: trusted META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* sut : ok=37 changed=2 unreachable=0 failed=0 skipped=35 rescued=0 ignored=0 Saturday 20 January 2024 05:49:01 +0000 (0:00:01.662) 0:00:17.557 ****** =============================================================================== linux-system-roles.firewall : Configure firewall ------------------------ 5.25s /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:77 Reset to zone defaults -------------------------------------------------- 1.66s /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:167 ----------------------- linux-system-roles.firewall : Configure firewall ------------------------ 1.20s /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:77 linux-system-roles.firewall : Get config files, checksums before and remove --- 1.15s /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:48 linux-system-roles.firewall : Get config files, checksums after --------- 0.65s /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:163 Verify firewalld zone internal services --------------------------------- 0.53s /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:108 ----------------------- Gathering Facts --------------------------------------------------------- 0.51s /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:2 ------------------------- linux-system-roles.firewall : Install firewalld ------------------------- 0.46s /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:20 Verify firewalld zone internal forward ports ---------------------------- 0.45s /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:124 ----------------------- Verify custom zone has masquerade added to it --------------------------- 0.45s /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:134 ----------------------- Verify firewalld zone internal ports ------------------------------------ 0.44s /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:116 ----------------------- Remove customzone zone -------------------------------------------------- 0.44s /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:161 ----------------------- Verify custom zone has masquerade added to it --------------------------- 0.44s /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:141 ----------------------- Verify that service http has been added to the default zone dmz --------- 0.43s /WORKDIR/git-weekly-ciqigczgku/tests/tests_zone.yml:148 ----------------------- linux-system-roles.firewall : Enable and start firewalld service -------- 0.42s /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:29 linux-system-roles.firewall : Unmask firewalld service ------------------ 0.41s /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:23 linux-system-roles.firewall : Install firewalld ------------------------- 0.39s /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:20 linux-system-roles.firewall : Install firewalld ------------------------- 0.38s /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/firewalld.yml:20 linux-system-roles.firewall : Unmask firewalld service ------------------ 0.32s /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:23 linux-system-roles.firewall : Enable and start firewalld service -------- 0.20s /WORKDIR/git-weekly-ciqigczgku/tests/roles/linux-system-roles.firewall/tasks/main.yml:29 ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- ---^---^---^---^---^---