# STDOUT: ---v---v---v---v---v--- ansible-playbook 2.9.27 config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.9/lib/python3.9/site-packages/ansible executable location = /opt/ansible-2.9/bin/ansible-playbook python version = 3.9.18 (main, Sep 7 2023, 00:00:00) [GCC 11.4.1 20230605 (Red Hat 11.4.1-2)] Using /etc/ansible/ansible.cfg as config file Skipping callback 'actionable', as we already have a stdout callback. Skipping callback 'counter_enabled', as we already have a stdout callback. Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'dense', as we already have a stdout callback. Skipping callback 'full_skip', as we already have a stdout callback. Skipping callback 'json', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'null', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. Skipping callback 'selective', as we already have a stdout callback. Skipping callback 'skippy', as we already have a stdout callback. Skipping callback 'stderr', as we already have a stdout callback. Skipping callback 'unixy', as we already have a stdout callback. Skipping callback 'yaml', as we already have a stdout callback. PLAYBOOK: tests_reload.yml ***************************************************** 1 plays in /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml PLAY [Ensure that crypto_policy_reload variable works] ************************* TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:3 Saturday 20 April 2024 04:34:20 +0000 (0:00:00.016) 0:00:00.016 ******** ok: [sut] META: ran handlers TASK [Run role to make sure all dependencies are installed] ******************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:8 Saturday 20 April 2024 04:34:21 +0000 (0:00:00.775) 0:00:00.791 ******** TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:3 Saturday 20 April 2024 04:34:21 +0000 (0:00:00.022) 0:00:00.814 ******** included: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml for sut TASK [linux-system-roles.crypto_policies : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:2 Saturday 20 April 2024 04:34:21 +0000 (0:00:00.018) 0:00:00.832 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:11 Saturday 20 April 2024 04:34:21 +0000 (0:00:00.023) 0:00:00.856 ******** ok: [sut] => { "changed": false, "stat": { "exists": false } } TASK [linux-system-roles.crypto_policies : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:16 Saturday 20 April 2024 04:34:21 +0000 (0:00:00.290) 0:00:01.146 ******** ok: [sut] => { "ansible_facts": { "__crypto_policies_is_ostree": false }, "changed": false } TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:20 Saturday 20 April 2024 04:34:21 +0000 (0:00:00.025) 0:00:01.172 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Ensure required packages are installed] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 Saturday 20 April 2024 04:34:21 +0000 (0:00:00.037) 0:00:01.209 ******** ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do lsrpackages: crypto-policies crypto-policies-scripts TASK [linux-system-roles.crypto_policies : Gather facts] *********************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:13 Saturday 20 April 2024 04:34:24 +0000 (0:00:02.856) 0:00:04.066 ******** included: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 20 April 2024 04:34:24 +0000 (0:00:00.017) 0:00:04.083 ******** ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.059315", "end": "2024-04-20 04:34:25.123051", "rc": 0, "start": "2024-04-20 04:34:25.063736" } STDOUT: DEFAULT TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 20 April 2024 04:34:25 +0000 (0:00:00.333) 0:00:04.416 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_active": "DEFAULT" }, "changed": false } TASK [linux-system-roles.crypto_policies : Find base policies files] *********** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:16 Saturday 20 April 2024 04:34:25 +0000 (0:00:00.022) 0:00:04.438 ******** ok: [sut] => { "changed": false, "examined": 7, "files": [ { "atime": 1709714802.077, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847522, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/DEFAULT.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2153, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847523, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/EMPTY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 267, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847524, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FIPS.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 1726, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847525, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FUTURE.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2102, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847526, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/LEGACY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2471, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 5 } TASK [linux-system-roles.crypto_policies : Set available base policies fact] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:24 Saturday 20 April 2024 04:34:25 +0000 (0:00:00.280) 0:00:04.719 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_available_policies": [ "FUTURE", "FIPS", "DEFAULT", "LEGACY", "EMPTY" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Find subpolicy files] *************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:31 Saturday 20 April 2024 04:34:25 +0000 (0:00:00.023) 0:00:04.742 ******** ok: [sut] => { "changed": false, "examined": 5, "files": [ { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672347, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/AD-SUPPORT.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 322, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672348, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/ECDHE-ONLY.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 121, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672349, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-CAMELLIA.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 90, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672350, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-SHA1.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 123, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672351, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/OSPP.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 1986, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 5 } TASK [linux-system-roles.crypto_policies : Set available subpolicies fact] ***** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:39 Saturday 20 April 2024 04:34:25 +0000 (0:00:00.205) 0:00:04.947 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_available_subpolicies": [ "AD-SUPPORT", "NO-SHA1", "ECDHE-ONLY", "OSPP", "NO-CAMELLIA" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Set crypto_policies_available_modules fact (deprecated)] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:46 Saturday 20 April 2024 04:34:25 +0000 (0:00:00.024) 0:00:04.972 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_available_modules": [ "AD-SUPPORT", "NO-SHA1", "ECDHE-ONLY", "OSPP", "NO-CAMELLIA" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Update crypto policy if needed] ***** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:52 Saturday 20 April 2024 04:34:25 +0000 (0:00:00.022) 0:00:04.994 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Set the reboot_required flag if needed] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:64 Saturday 20 April 2024 04:34:25 +0000 (0:00:00.020) 0:00:05.015 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Update facts after applying policy] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:72 Saturday 20 April 2024 04:34:25 +0000 (0:00:00.021) 0:00:05.036 ******** included: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 20 April 2024 04:34:25 +0000 (0:00:00.015) 0:00:05.052 ******** ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.058671", "end": "2024-04-20 04:34:26.018572", "rc": 0, "start": "2024-04-20 04:34:25.959901" } STDOUT: DEFAULT TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 20 April 2024 04:34:26 +0000 (0:00:00.260) 0:00:05.312 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_active": "DEFAULT" }, "changed": false } TASK [Get SSHD pid before policy update] *************************************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:12 Saturday 20 April 2024 04:34:26 +0000 (0:00:00.021) 0:00:05.333 ******** ok: [sut] => { "changed": false, "content": "MTAzMAo=", "encoding": "base64", "source": "/var/run/sshd.pid" } TASK [Change policy from DEFAULT TO LEGACY (disable reload)] ******************* task path: /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:17 Saturday 20 April 2024 04:34:26 +0000 (0:00:00.270) 0:00:05.604 ******** TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:3 Saturday 20 April 2024 04:34:26 +0000 (0:00:00.023) 0:00:05.627 ******** included: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml for sut TASK [linux-system-roles.crypto_policies : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:2 Saturday 20 April 2024 04:34:26 +0000 (0:00:00.014) 0:00:05.642 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:11 Saturday 20 April 2024 04:34:26 +0000 (0:00:00.021) 0:00:05.664 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:16 Saturday 20 April 2024 04:34:26 +0000 (0:00:00.021) 0:00:05.685 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:20 Saturday 20 April 2024 04:34:26 +0000 (0:00:00.020) 0:00:05.706 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Ensure required packages are installed] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 Saturday 20 April 2024 04:34:26 +0000 (0:00:00.037) 0:00:05.743 ******** ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do lsrpackages: crypto-policies crypto-policies-scripts TASK [linux-system-roles.crypto_policies : Gather facts] *********************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:13 Saturday 20 April 2024 04:34:29 +0000 (0:00:02.759) 0:00:08.503 ******** included: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 20 April 2024 04:34:29 +0000 (0:00:00.016) 0:00:08.519 ******** ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.058125", "end": "2024-04-20 04:34:29.486079", "rc": 0, "start": "2024-04-20 04:34:29.427954" } STDOUT: DEFAULT TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 20 April 2024 04:34:29 +0000 (0:00:00.260) 0:00:08.779 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_active": "DEFAULT" }, "changed": false } TASK [linux-system-roles.crypto_policies : Find base policies files] *********** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:16 Saturday 20 April 2024 04:34:29 +0000 (0:00:00.022) 0:00:08.801 ******** ok: [sut] => { "changed": false, "examined": 7, "files": [ { "atime": 1709714802.077, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847522, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/DEFAULT.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2153, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847523, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/EMPTY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 267, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847524, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FIPS.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 1726, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847525, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FUTURE.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2102, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847526, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/LEGACY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2471, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 5 } TASK [linux-system-roles.crypto_policies : Set available base policies fact] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:24 Saturday 20 April 2024 04:34:29 +0000 (0:00:00.205) 0:00:09.007 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_available_policies": [ "FUTURE", "FIPS", "DEFAULT", "LEGACY", "EMPTY" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Find subpolicy files] *************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:31 Saturday 20 April 2024 04:34:29 +0000 (0:00:00.025) 0:00:09.033 ******** ok: [sut] => { "changed": false, "examined": 5, "files": [ { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672347, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/AD-SUPPORT.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 322, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672348, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/ECDHE-ONLY.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 121, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672349, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-CAMELLIA.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 90, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672350, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-SHA1.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 123, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672351, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/OSPP.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 1986, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 5 } TASK [linux-system-roles.crypto_policies : Set available subpolicies fact] ***** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:39 Saturday 20 April 2024 04:34:29 +0000 (0:00:00.205) 0:00:09.238 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_available_subpolicies": [ "AD-SUPPORT", "NO-SHA1", "ECDHE-ONLY", "OSPP", "NO-CAMELLIA" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Set crypto_policies_available_modules fact (deprecated)] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:46 Saturday 20 April 2024 04:34:29 +0000 (0:00:00.024) 0:00:09.263 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_available_modules": [ "AD-SUPPORT", "NO-SHA1", "ECDHE-ONLY", "OSPP", "NO-CAMELLIA" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Update crypto policy if needed] ***** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:52 Saturday 20 April 2024 04:34:30 +0000 (0:00:00.022) 0:00:09.285 ******** NOTIFIED HANDLER linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes for sut NOTIFIED HANDLER linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag for sut NOTIFIED HANDLER linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes for sut NOTIFIED HANDLER linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag for sut changed: [sut] => { "changed": true, "cmd": [ "update-crypto-policies", "--no-reload", "--set", "LEGACY" ], "delta": "0:00:00.125539", "end": "2024-04-20 04:34:30.331532", "rc": 0, "start": "2024-04-20 04:34:30.205993" } STDOUT: Setting system policy to LEGACY Note: System-wide crypto policies are applied on application start-up. It is recommended to restart the system for the change of policies to fully take place. TASK [linux-system-roles.crypto_policies : Set the reboot_required flag if needed] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:64 Saturday 20 April 2024 04:34:30 +0000 (0:00:00.339) 0:00:09.624 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_reboot_required": true }, "changed": false } TASK [linux-system-roles.crypto_policies : Update facts after applying policy] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:72 Saturday 20 April 2024 04:34:30 +0000 (0:00:00.024) 0:00:09.649 ******** included: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 20 April 2024 04:34:30 +0000 (0:00:00.016) 0:00:09.665 ******** ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.058509", "end": "2024-04-20 04:34:30.636644", "rc": 0, "start": "2024-04-20 04:34:30.578135" } STDOUT: LEGACY TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 20 April 2024 04:34:30 +0000 (0:00:00.264) 0:00:09.929 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_active": "LEGACY" }, "changed": false } TASK [Get sshd pid after first update] ***************************************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:24 Saturday 20 April 2024 04:34:30 +0000 (0:00:00.022) 0:00:09.951 ******** ok: [sut] => { "changed": false, "content": "MTAzMAo=", "encoding": "base64", "source": "/var/run/sshd.pid" } TASK [Verify that policy was changed to LEGACY] ******************************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:29 Saturday 20 April 2024 04:34:30 +0000 (0:00:00.195) 0:00:10.147 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Check the sshd was not reloaded] ***************************************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:33 Saturday 20 April 2024 04:34:30 +0000 (0:00:00.023) 0:00:10.170 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Change policy from LEGACY to DEFAULT (reload by default)] **************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:38 Saturday 20 April 2024 04:34:30 +0000 (0:00:00.022) 0:00:10.193 ******** TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:3 Saturday 20 April 2024 04:34:30 +0000 (0:00:00.026) 0:00:10.219 ******** included: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml for sut TASK [linux-system-roles.crypto_policies : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:2 Saturday 20 April 2024 04:34:30 +0000 (0:00:00.016) 0:00:10.235 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:11 Saturday 20 April 2024 04:34:30 +0000 (0:00:00.021) 0:00:10.257 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:16 Saturday 20 April 2024 04:34:31 +0000 (0:00:00.020) 0:00:10.278 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:20 Saturday 20 April 2024 04:34:31 +0000 (0:00:00.019) 0:00:10.297 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Ensure required packages are installed] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 Saturday 20 April 2024 04:34:31 +0000 (0:00:00.034) 0:00:10.331 ******** ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do lsrpackages: crypto-policies crypto-policies-scripts TASK [linux-system-roles.crypto_policies : Gather facts] *********************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:13 Saturday 20 April 2024 04:34:33 +0000 (0:00:02.777) 0:00:13.109 ******** included: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 20 April 2024 04:34:33 +0000 (0:00:00.017) 0:00:13.127 ******** ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.060065", "end": "2024-04-20 04:34:34.099837", "rc": 0, "start": "2024-04-20 04:34:34.039772" } STDOUT: LEGACY TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 20 April 2024 04:34:34 +0000 (0:00:00.266) 0:00:13.393 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_active": "LEGACY" }, "changed": false } TASK [linux-system-roles.crypto_policies : Find base policies files] *********** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:16 Saturday 20 April 2024 04:34:34 +0000 (0:00:00.022) 0:00:13.415 ******** ok: [sut] => { "changed": false, "examined": 7, "files": [ { "atime": 1709714802.077, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847522, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/DEFAULT.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2153, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847523, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/EMPTY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 267, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847524, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FIPS.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 1726, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847525, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FUTURE.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2102, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1713587670.2580805, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847526, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/LEGACY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2471, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 5 } TASK [linux-system-roles.crypto_policies : Set available base policies fact] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:24 Saturday 20 April 2024 04:34:34 +0000 (0:00:00.205) 0:00:13.620 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_available_policies": [ "FUTURE", "FIPS", "DEFAULT", "LEGACY", "EMPTY" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Find subpolicy files] *************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:31 Saturday 20 April 2024 04:34:34 +0000 (0:00:00.023) 0:00:13.644 ******** ok: [sut] => { "changed": false, "examined": 5, "files": [ { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672347, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/AD-SUPPORT.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 322, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672348, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/ECDHE-ONLY.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 121, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672349, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-CAMELLIA.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 90, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672350, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-SHA1.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 123, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672351, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/OSPP.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 1986, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 5 } TASK [linux-system-roles.crypto_policies : Set available subpolicies fact] ***** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:39 Saturday 20 April 2024 04:34:34 +0000 (0:00:00.207) 0:00:13.852 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_available_subpolicies": [ "AD-SUPPORT", "NO-SHA1", "ECDHE-ONLY", "OSPP", "NO-CAMELLIA" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Set crypto_policies_available_modules fact (deprecated)] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:46 Saturday 20 April 2024 04:34:34 +0000 (0:00:00.025) 0:00:13.877 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_available_modules": [ "AD-SUPPORT", "NO-SHA1", "ECDHE-ONLY", "OSPP", "NO-CAMELLIA" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Update crypto policy if needed] ***** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:52 Saturday 20 April 2024 04:34:34 +0000 (0:00:00.022) 0:00:13.899 ******** NOTIFIED HANDLER linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes for sut NOTIFIED HANDLER linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag for sut changed: [sut] => { "changed": true, "cmd": [ "update-crypto-policies", "--set", "DEFAULT" ], "delta": "0:00:00.157613", "end": "2024-04-20 04:34:34.981462", "rc": 0, "start": "2024-04-20 04:34:34.823849" } STDOUT: Setting system policy to DEFAULT Note: System-wide crypto policies are applied on application start-up. It is recommended to restart the system for the change of policies to fully take place. TASK [linux-system-roles.crypto_policies : Set the reboot_required flag if needed] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:64 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.375) 0:00:14.274 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_reboot_required": true }, "changed": false } TASK [linux-system-roles.crypto_policies : Update facts after applying policy] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:72 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.024) 0:00:14.299 ******** included: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.015) 0:00:14.314 ******** ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.060396", "end": "2024-04-20 04:34:35.285691", "rc": 0, "start": "2024-04-20 04:34:35.225295" } STDOUT: DEFAULT TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.264) 0:00:14.579 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_active": "DEFAULT" }, "changed": false } TASK [Get sshd pid after second update] **************************************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:44 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.021) 0:00:14.601 ******** ok: [sut] => { "changed": false, "content": "MTA0OTQK", "encoding": "base64", "source": "/var/run/sshd.pid" } TASK [Verify that policy was changed to DEFAULT] ******************************* task path: /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:49 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.196) 0:00:14.797 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Check the sshd was reloaded] ********************************************* task path: /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:54 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.023) 0:00:14.820 ******** ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Restore policy to DEFAULT] *********************************************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:60 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.022) 0:00:14.843 ******** TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:3 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.026) 0:00:14.869 ******** included: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml for sut TASK [linux-system-roles.crypto_policies : Ensure ansible_facts used by role] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:2 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.015) 0:00:14.885 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Check if system is ostree] ********** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:11 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.021) 0:00:14.907 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Set flag to indicate system is ostree] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:16 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.020) 0:00:14.927 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Set platform/version specific variables] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:20 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.019) 0:00:14.947 ******** skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=CentOS_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "CentOS_8.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Ensure required packages are installed] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 Saturday 20 April 2024 04:34:35 +0000 (0:00:00.038) 0:00:14.986 ******** ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do lsrpackages: crypto-policies crypto-policies-scripts TASK [linux-system-roles.crypto_policies : Gather facts] *********************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:13 Saturday 20 April 2024 04:34:38 +0000 (0:00:02.758) 0:00:17.744 ******** included: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 20 April 2024 04:34:38 +0000 (0:00:00.017) 0:00:17.761 ******** ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.057256", "end": "2024-04-20 04:34:38.727905", "rc": 0, "start": "2024-04-20 04:34:38.670649" } STDOUT: DEFAULT TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 20 April 2024 04:34:38 +0000 (0:00:00.258) 0:00:18.020 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_active": "DEFAULT" }, "changed": false } TASK [linux-system-roles.crypto_policies : Find base policies files] *********** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:16 Saturday 20 April 2024 04:34:38 +0000 (0:00:00.022) 0:00:18.042 ******** ok: [sut] => { "changed": false, "examined": 7, "files": [ { "atime": 1713587674.8750992, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847522, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/DEFAULT.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2153, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847523, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/EMPTY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 267, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847524, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FIPS.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 1726, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847525, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FUTURE.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2102, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1713587670.2580805, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 6847526, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/LEGACY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2471, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 5 } TASK [linux-system-roles.crypto_policies : Set available base policies fact] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:24 Saturday 20 April 2024 04:34:38 +0000 (0:00:00.203) 0:00:18.246 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_available_policies": [ "FUTURE", "FIPS", "DEFAULT", "LEGACY", "EMPTY" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Find subpolicy files] *************** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:31 Saturday 20 April 2024 04:34:38 +0000 (0:00:00.024) 0:00:18.270 ******** ok: [sut] => { "changed": false, "examined": 5, "files": [ { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672347, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/AD-SUPPORT.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 322, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672348, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/ECDHE-ONLY.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 121, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672349, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-CAMELLIA.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 90, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672350, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-SHA1.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 123, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1690903086.0, "ctime": 1709714766.661, "dev": 51713, "gid": 0, "gr_name": "root", "inode": 672351, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1690903086.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/OSPP.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 1986, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 5 } TASK [linux-system-roles.crypto_policies : Set available subpolicies fact] ***** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:39 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.204) 0:00:18.475 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_available_subpolicies": [ "AD-SUPPORT", "NO-SHA1", "ECDHE-ONLY", "OSPP", "NO-CAMELLIA" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Set crypto_policies_available_modules fact (deprecated)] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:46 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.023) 0:00:18.498 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_available_modules": [ "AD-SUPPORT", "NO-SHA1", "ECDHE-ONLY", "OSPP", "NO-CAMELLIA" ] }, "changed": false } TASK [linux-system-roles.crypto_policies : Update crypto policy if needed] ***** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:52 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.022) 0:00:18.521 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Set the reboot_required flag if needed] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:64 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.023) 0:00:18.545 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.crypto_policies : Update facts after applying policy] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:72 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.023) 0:00:18.568 ******** included: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml for sut TASK [linux-system-roles.crypto_policies : Find out what is the currently active policy] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.016) 0:00:18.584 ******** ok: [sut] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.058692", "end": "2024-04-20 04:34:39.552470", "rc": 0, "start": "2024-04-20 04:34:39.493778" } STDOUT: DEFAULT TASK [linux-system-roles.crypto_policies : Set current policy fact] ************ task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:9 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.260) 0:00:18.845 ******** ok: [sut] => { "ansible_facts": { "crypto_policies_active": "DEFAULT" }, "changed": false } RUNNING HANDLER [linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:4 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.020) 0:00:18.865 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } RUNNING HANDLER [linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:11 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.023) 0:00:18.889 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } RUNNING HANDLER [linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:4 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.022) 0:00:18.911 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } RUNNING HANDLER [linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:11 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.021) 0:00:18.933 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } RUNNING HANDLER [linux-system-roles.crypto_policies : Reboot the managed host to apply crypto policies changes] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:4 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.022) 0:00:18.956 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } RUNNING HANDLER [linux-system-roles.crypto_policies : Clear the crypto_policies_reboot_required flag] *** task path: /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/handlers/main.yml:11 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.022) 0:00:18.978 ******** skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } META: ran handlers TASK [Check the current policy has been restored to DEFAULT] ******************* task path: /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:73 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.025) 0:00:19.003 ******** ok: [sut] => { "changed": false } MSG: All assertions passed META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* sut : ok=67 changed=2 unreachable=0 failed=0 skipped=24 rescued=0 ignored=0 Saturday 20 April 2024 04:34:39 +0000 (0:00:00.020) 0:00:19.024 ******** =============================================================================== linux-system-roles.crypto_policies : Ensure required packages are installed --- 5.54s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 linux-system-roles.crypto_policies : Ensure required packages are installed --- 2.86s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 linux-system-roles.crypto_policies : Ensure required packages are installed --- 2.76s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:6 Gathering Facts --------------------------------------------------------- 0.78s /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:3 ----------------------- linux-system-roles.crypto_policies : Find subpolicy files --------------- 0.41s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:31 linux-system-roles.crypto_policies : Find base policies files ----------- 0.41s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:16 linux-system-roles.crypto_policies : Update crypto policy if needed ----- 0.40s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:52 linux-system-roles.crypto_policies : Update crypto policy if needed ----- 0.34s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:52 linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.33s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Check if system is ostree ---------- 0.29s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/set_vars.yml:11 linux-system-roles.crypto_policies : Find base policies files ----------- 0.28s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:16 Get SSHD pid before policy update --------------------------------------- 0.27s /WORKDIR/git-weekly-cigka53uj2/tests/tests_reload.yml:12 ---------------------- linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.27s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.26s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.26s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.26s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.26s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.26s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Find out what is the currently active policy --- 0.26s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/gather_facts.yml:3 linux-system-roles.crypto_policies : Find base policies files ----------- 0.21s /WORKDIR/git-weekly-cigka53uj2/tests/roles/linux-system-roles.crypto_policies/tasks/main.yml:16 ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- ---^---^---^---^---^---