# STDOUT: ---v---v---v---v---v--- Using /etc/ansible/ansible.cfg as config file PLAY [Test issuing certificate with nonexistent provider] ********************** TASK [Gathering Facts] ********************************************************* Thursday 18 August 2022 22:37:42 +0000 (0:00:00.019) 0:00:00.019 ******* ok: [sut] TASK [linux-system-roles.certificate : Set version specific variables] ********* Thursday 18 August 2022 22:37:43 +0000 (0:00:01.108) 0:00:01.127 ******* included: /WORKDIR/dist-git-certificate-use_distro_python_cryptography-ir2vbc/tests/roles/linux-system-roles.certificate/tasks/set_vars.yml for sut TASK [linux-system-roles.certificate : Ensure ansible_facts used by role] ****** Thursday 18 August 2022 22:37:43 +0000 (0:00:00.038) 0:00:01.166 ******* ok: [sut] TASK [linux-system-roles.certificate : Set platform/version specific variables] *** Thursday 18 August 2022 22:37:43 +0000 (0:00:00.452) 0:00:01.619 ******* skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat_8.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=RedHat_8.7.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat_8.7.yml", "skip_reason": "Conditional result was False" } TASK [linux-system-roles.certificate : Ensure certificate role dependencies are installed] *** Thursday 18 August 2022 22:37:43 +0000 (0:00:00.058) 0:00:01.677 ******* changed: [sut] => { "changed": true, "rc": 0, "results": [ "Installed: python3-pyasn1-0.3.7-6.el8.noarch" ] } TASK [linux-system-roles.certificate : Ensure provider packages are installed] *** Thursday 18 August 2022 22:37:47 +0000 (0:00:03.826) 0:00:05.504 ******* skipping: [sut] => (item=fake-provider) => { "__certificate_provider": "fake-provider", "ansible_loop_var": "__certificate_provider", "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.certificate : Ensure pre-scripts hooks directory exists] *** Thursday 18 August 2022 22:37:47 +0000 (0:00:00.059) 0:00:05.563 ******* skipping: [sut] => (item=fake-provider) => { "__certificate_provider": "fake-provider", "ansible_loop_var": "__certificate_provider", "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.certificate : Ensure post-scripts hooks directory exists] *** Thursday 18 August 2022 22:37:47 +0000 (0:00:00.060) 0:00:05.623 ******* skipping: [sut] => (item=fake-provider) => { "__certificate_provider": "fake-provider", "ansible_loop_var": "__certificate_provider", "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.certificate : Ensure provider service is running] ***** Thursday 18 August 2022 22:37:47 +0000 (0:00:00.059) 0:00:05.683 ******* skipping: [sut] => (item=fake-provider) => { "__certificate_provider": "fake-provider", "ansible_loop_var": "__certificate_provider", "changed": false, "skip_reason": "Conditional result was False" } TASK [linux-system-roles.certificate : Ensure certificate requests] ************ Thursday 18 August 2022 22:37:47 +0000 (0:00:00.058) 0:00:05.742 ******* failed: [sut] (item={'name': 'mycert_wrong_provider', 'dns': 'www.example.com', 'ca': 'self-sign', 'provider': 'fake-provider'}) => { "ansible_loop_var": "item", "changed": false, "item": { "ca": "self-sign", "dns": "www.example.com", "name": "mycert_wrong_provider", "provider": "fake-provider" } } MSG: Chosen provider 'fake-provider' is not available. TASK [assert...] *************************************************************** Thursday 18 August 2022 22:37:48 +0000 (0:00:00.549) 0:00:06.292 ******* ok: [sut] => { "changed": false } MSG: All assertions passed PLAY RECAP ********************************************************************* sut : ok=5 changed=1 unreachable=0 failed=0 skipped=5 rescued=1 ignored=0 Thursday 18 August 2022 22:37:48 +0000 (0:00:00.060) 0:00:06.353 ******* =============================================================================== linux-system-roles.certificate : Ensure certificate role dependencies are installed --- 3.83s Gathering Facts --------------------------------------------------------- 1.11s linux-system-roles.certificate : Ensure certificate requests ------------ 0.55s linux-system-roles.certificate : Ensure ansible_facts used by role ------ 0.45s assert... --------------------------------------------------------------- 0.06s linux-system-roles.certificate : Ensure pre-scripts hooks directory exists --- 0.06s linux-system-roles.certificate : Ensure post-scripts hooks directory exists --- 0.06s linux-system-roles.certificate : Ensure provider packages are installed --- 0.06s linux-system-roles.certificate : Set platform/version specific variables --- 0.06s linux-system-roles.certificate : Ensure provider service is running ----- 0.06s linux-system-roles.certificate : Set version specific variables --------- 0.04s ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- [DEPRECATION WARNING]: [defaults]callback_whitelist option, normalizing names to new standard, use callbacks_enabled instead. This feature will be removed from ansible-core in version 2.15. Deprecation warnings can be disabled by setting deprecation_warnings=False in ansible.cfg. ---^---^---^---^---^---