Last active
June 27, 2022 05:20
-
-
Save benformosa/e6b95b09f0d55377738a6ff85d4189c9 to your computer and use it in GitHub Desktop.
Test idempotency of postgresql_user module with SCRAM password
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2022-06-27 15:15:35,080 p=2312317 u=ben n=ansible | PLAY [Test idempotency of postgresql_user module with SCRAM password] **************************************************************************************** | |
2022-06-27 15:15:35,092 p=2312317 u=ben n=ansible | TASK [Gathering Facts] *************************************************************************************************************************************** | |
2022-06-27 15:15:36,959 p=2312317 u=ben n=ansible | ok: [localhost] | |
2022-06-27 15:15:36,978 p=2312317 u=ben n=ansible | TASK [Remove test users] ************************************************************************************************************************************* | |
2022-06-27 15:15:37,596 p=2312317 u=ben n=ansible | ok: [localhost] => (item=clearpassword) | |
2022-06-27 15:15:38,003 p=2312317 u=ben n=ansible | ok: [localhost] => (item=scrampassword) | |
2022-06-27 15:15:38,014 p=2312317 u=ben n=ansible | TASK [Create users] ****************************************************************************************************************************************** | |
2022-06-27 15:15:38,458 p=2312317 u=ben n=ansible | changed: [localhost] => (item=clearpassword) | |
2022-06-27 15:15:38,872 p=2312317 u=ben n=ansible | changed: [localhost] => (item=scrampassword) | |
2022-06-27 15:15:38,882 p=2312317 u=ben n=ansible | TASK [Create users - again] ********************************************************************************************************************************** | |
2022-06-27 15:15:39,314 p=2312317 u=ben n=ansible | ok: [localhost] => (item=clearpassword) | |
2022-06-27 15:15:39,723 p=2312317 u=ben n=ansible | changed: [localhost] => (item=scrampassword) | |
2022-06-27 15:15:39,734 p=2312317 u=ben n=ansible | TASK [Get password of user scrampassword] ******************************************************************************************************************** | |
2022-06-27 15:15:40,329 p=2312317 u=ben n=ansible | ok: [localhost] | |
2022-06-27 15:15:40,340 p=2312317 u=ben n=ansible | TASK [Assert that given password is the same as the stored password] ***************************************************************************************** | |
2022-06-27 15:15:40,377 p=2312317 u=ben n=ansible | ok: [localhost] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
2022-06-27 15:15:40,388 p=2312317 u=ben n=ansible | TASK [Assert that users were not changed the second time] **************************************************************************************************** | |
2022-06-27 15:15:40,412 p=2312317 u=ben n=ansible | ok: [localhost] => (item={'user': 'clearpassword', 'changed': False, 'queries': [], 'invocation': {'module_args': {'name': 'clearpassword', 'password': 'VALUE_SPECIFIED_IN_NO_LOG_PARAMETER', 'user': 'clearpassword', 'login_user': 'postgres', 'login_password': '', 'login_host': '', 'login_unix_socket': '', 'port': 5432, 'ssl_mode': 'prefer', 'state': 'present', 'db': '', 'fail_on_user': True, 'role_attr_flags': '', 'encrypted': True, 'no_password_changes': False, 'trust_input': True, 'ca_cert': None, 'priv': None, 'expires': None, 'conn_limit': None, 'session_role': None, 'groups': None, 'comment': None}}, 'failed': False, 'item': {'name': 'clearpassword', 'password': 'swordfish'}, 'ansible_loop_var': 'item'}) => { | |
"ansible_loop_var": "item", | |
"changed": false, | |
"item": { | |
"ansible_loop_var": "item", | |
"changed": false, | |
"failed": false, | |
"invocation": { | |
"module_args": { | |
"ca_cert": null, | |
"comment": null, | |
"conn_limit": null, | |
"db": "", | |
"encrypted": true, | |
"expires": null, | |
"fail_on_user": true, | |
"groups": null, | |
"login_host": "", | |
"login_password": "", | |
"login_unix_socket": "", | |
"login_user": "postgres", | |
"name": "clearpassword", | |
"no_password_changes": false, | |
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER", | |
"port": 5432, | |
"priv": null, | |
"role_attr_flags": "", | |
"session_role": null, | |
"ssl_mode": "prefer", | |
"state": "present", | |
"trust_input": true, | |
"user": "clearpassword" | |
} | |
}, | |
"item": { | |
"name": "clearpassword", | |
"password": "swordfish" | |
}, | |
"queries": [], | |
"user": "clearpassword" | |
}, | |
"msg": "All assertions passed" | |
} | |
2022-06-27 15:15:40,416 p=2312317 u=ben n=ansible | failed: [localhost] (item={'user': 'scrampassword', 'changed': True, 'queries': [], 'invocation': {'module_args': {'name': 'scrampassword', 'password': 'VALUE_SPECIFIED_IN_NO_LOG_PARAMETER', 'user': 'scrampassword', 'login_user': 'postgres', 'login_password': '', 'login_host': '', 'login_unix_socket': '', 'port': 5432, 'ssl_mode': 'prefer', 'state': 'present', 'db': '', 'fail_on_user': True, 'role_attr_flags': '', 'encrypted': True, 'no_password_changes': False, 'trust_input': True, 'ca_cert': None, 'priv': None, 'expires': None, 'conn_limit': None, 'session_role': None, 'groups': None, 'comment': None}}, 'failed': False, 'item': {'name': 'scrampassword', 'password': 'SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8='}, 'ansible_loop_var': 'item'}) => { | |
"ansible_loop_var": "item", | |
"assertion": "item.changed == False", | |
"changed": false, | |
"evaluated_to": false, | |
"item": { | |
"ansible_loop_var": "item", | |
"changed": true, | |
"failed": false, | |
"invocation": { | |
"module_args": { | |
"ca_cert": null, | |
"comment": null, | |
"conn_limit": null, | |
"db": "", | |
"encrypted": true, | |
"expires": null, | |
"fail_on_user": true, | |
"groups": null, | |
"login_host": "", | |
"login_password": "", | |
"login_unix_socket": "", | |
"login_user": "postgres", | |
"name": "scrampassword", | |
"no_password_changes": false, | |
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER", | |
"port": 5432, | |
"priv": null, | |
"role_attr_flags": "", | |
"session_role": null, | |
"ssl_mode": "prefer", | |
"state": "present", | |
"trust_input": true, | |
"user": "scrampassword" | |
} | |
}, | |
"item": { | |
"name": "scrampassword", | |
"password": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8=" | |
}, | |
"queries": [], | |
"user": "scrampassword" | |
}, | |
"msg": "Assertion failed" | |
} | |
2022-06-27 15:15:40,418 p=2312317 u=ben n=ansible | ...ignoring | |
2022-06-27 15:15:40,437 p=2312317 u=ben n=ansible | PLAY RECAP *************************************************************************************************************************************************** | |
2022-06-27 15:15:40,437 p=2312317 u=ben n=ansible | localhost : ok=7 changed=2 unreachable=0 failed=0 skipped=0 rescued=0 ignored=1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
- name: Test idempotency of postgresql_user module with SCRAM password | |
hosts: localhost | |
vars: | |
scrampassword: SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8= | |
users: | |
- name: clearpassword | |
password: swordfish | |
- name: scrampassword | |
password: "{{ scrampassword }}" | |
tasks: | |
- name: Remove test users | |
community.postgresql.postgresql_user: | |
name: "{{ item.name }}" | |
state: absent | |
become: true | |
become_user: postgres | |
loop: "{{ users }}" | |
loop_control: | |
label: "{{ item.name }}" | |
- name: Create users | |
community.postgresql.postgresql_user: | |
name: "{{ item.name }}" | |
password: "{{ item.password }}" | |
become: true | |
become_user: postgres | |
loop: "{{ users }}" | |
loop_control: | |
label: "{{ item.name }}" | |
environment: | |
PGOPTIONS: "-c password_encryption=scram-sha-256" | |
- name: Create users - again | |
community.postgresql.postgresql_user: | |
name: "{{ item.name }}" | |
password: "{{ item.password }}" | |
become: true | |
become_user: postgres | |
loop: "{{ users }}" | |
loop_control: | |
label: "{{ item.name }}" | |
environment: | |
PGOPTIONS: "-c password_encryption=scram-sha-256" | |
register: users_again | |
- name: Get password of user scrampassword | |
community.postgresql.postgresql_query: | |
db: postgres | |
query: "SELECT rolpassword FROM pg_authid WHERE rolname='scrampassword';" | |
become: true | |
become_user: postgres | |
register: query | |
- name: Assert that given password is the same as the stored password | |
ansible.builtin.assert: | |
that: | |
- db_password == scrampassword | |
vars: | |
db_password: "{{ (query.query_result | first)['rolpassword'] }}" | |
- name: Assert that users were not changed the second time | |
ansible.builtin.assert: | |
that: | |
- item.changed == False | |
loop: "{{ users_again.results }}" | |
ignore_errors: true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2022-06-27 15:17:38,848 p=2312675 u=ben n=ansible | ansible-playbook [core 2.12.2] | |
config file = /home/ben/.ansible.cfg | |
configured module search path = ['/home/ben/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] | |
ansible python module location = /usr/lib/python3.8/site-packages/ansible | |
ansible collection location = /home/ben/.ansible/collections:/usr/share/ansible/collections | |
executable location = /usr/bin/ansible-playbook | |
python version = 3.8.12 (default, Sep 16 2021, 10:46:05) [GCC 8.5.0 20210514 (Red Hat 8.5.0-3)] | |
jinja version = 2.10.3 | |
libyaml = True | |
2022-06-27 15:17:38,848 p=2312675 u=ben n=ansible | Using /home/ben/.ansible.cfg as config file | |
2022-06-27 15:17:38,856 p=2312675 u=ben n=ansible | host_list declined parsing /home/ben/git/ansible/inventory.ini as it did not pass its verify_file() method | |
2022-06-27 15:17:38,856 p=2312675 u=ben n=ansible | script declined parsing /home/ben/git/ansible/inventory.ini as it did not pass its verify_file() method | |
2022-06-27 15:17:38,856 p=2312675 u=ben n=ansible | auto declined parsing /home/ben/git/ansible/inventory.ini as it did not pass its verify_file() method | |
2022-06-27 15:17:38,856 p=2312675 u=ben n=ansible | yaml declined parsing /home/ben/git/ansible/inventory.ini as it did not pass its verify_file() method | |
2022-06-27 15:17:38,858 p=2312675 u=ben n=ansible | Parsed /home/ben/git/ansible/inventory.ini inventory source with ini plugin | |
2022-06-27 15:17:38,990 p=2312675 u=ben n=ansible | Skipping callback 'default', as we already have a stdout callback. | |
2022-06-27 15:17:38,990 p=2312675 u=ben n=ansible | Skipping callback 'minimal', as we already have a stdout callback. | |
2022-06-27 15:17:38,990 p=2312675 u=ben n=ansible | Skipping callback 'oneline', as we already have a stdout callback. | |
2022-06-27 15:17:38,990 p=2312675 u=ben n=ansible | PLAYBOOK: play_postgres_user.yml ***************************************************************************************************************************** | |
2022-06-27 15:17:38,990 p=2312675 u=ben n=ansible | 1 plays in play_postgres_user.yml | |
2022-06-27 15:17:38,992 p=2312675 u=ben n=ansible | PLAY [Test idempotency of postgresql_user module with SCRAM password] **************************************************************************************** | |
2022-06-27 15:17:39,004 p=2312675 u=ben n=ansible | TASK [Gathering Facts] *************************************************************************************************************************************** | |
2022-06-27 15:17:39,019 p=2312680 u=ben n=ansible | <localhost> ESTABLISH LOCAL CONNECTION FOR USER: ben | |
2022-06-27 15:17:39,019 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0' | |
2022-06-27 15:17:39,038 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /home/ben/.ansible/tmp `"&& mkdir "` echo /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676 `" && echo ansible-tmp-1656307059.0375886-2312680-170081346281676="` echo /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676 `" ) && sleep 0' | |
2022-06-27 15:17:39,387 p=2312680 u=ben n=ansible | <localhost> Attempting python interpreter discovery | |
2022-06-27 15:17:39,387 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo PLATFORM; uname; echo FOUND; command -v '"'"'python3.10'"'"'; command -v '"'"'python3.9'"'"'; command -v '"'"'python3.8'"'"'; command -v '"'"'python3.7'"'"'; command -v '"'"'python3.6'"'"'; command -v '"'"'python3.5'"'"'; command -v '"'"'/usr/bin/python3'"'"'; command -v '"'"'/usr/libexec/platform-python'"'"'; command -v '"'"'python2.7'"'"'; command -v '"'"'python2.6'"'"'; command -v '"'"'/usr/bin/python'"'"'; command -v '"'"'python'"'"'; echo ENDFOUND && sleep 0' | |
2022-06-27 15:17:39,405 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c '/usr/bin/python3.8 && sleep 0' | |
2022-06-27 15:17:39,464 p=2312680 u=ben n=ansible | Using module file /usr/lib/python3.8/site-packages/ansible/modules/setup.py | |
2022-06-27 15:17:39,465 p=2312680 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmp2ixxco2p TO /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676/AnsiballZ_setup.py | |
2022-06-27 15:17:39,475 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'chmod u+x /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676/ /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676/AnsiballZ_setup.py && sleep 0' | |
2022-06-27 15:17:39,492 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c '/usr/libexec/platform-python /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676/AnsiballZ_setup.py && sleep 0' | |
2022-06-27 15:17:40,457 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676/ > /dev/null 2>&1 && sleep 0' | |
2022-06-27 15:17:40,496 p=2312675 u=ben n=ansible | ok: [localhost] | |
2022-06-27 15:17:40,506 p=2312675 u=ben n=ansible | META: ran handlers | |
2022-06-27 15:17:40,515 p=2312675 u=ben n=ansible | TASK [Remove test users] ************************************************************************************************************************************* | |
2022-06-27 15:17:40,534 p=2312812 u=ben n=ansible | <localhost> ESTABLISH LOCAL CONNECTION FOR USER: ben | |
2022-06-27 15:17:40,534 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0' | |
2022-06-27 15:17:40,549 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759 `" && echo ansible-tmp-1656307060.5489478-2312812-238008988160759="` echo /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759 `" ) && sleep 0' | |
2022-06-27 15:17:40,759 p=2312812 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_user.py | |
2022-06-27 15:17:40,760 p=2312812 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmpuua10m9s TO /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759/AnsiballZ_postgresql_user.py | |
2022-06-27 15:17:40,768 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759/ /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759/AnsiballZ_postgresql_user.py && sleep 0' | |
2022-06-27 15:17:40,785 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-qacvzdlerhjzjamggpysraayvvkwmaxr ; /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759/AnsiballZ_postgresql_user.py'"'"' && sleep 0' | |
2022-06-27 15:17:41,115 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759/ > /dev/null 2>&1 && sleep 0' | |
2022-06-27 15:17:41,139 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0' | |
2022-06-27 15:17:41,139 p=2312675 u=ben n=ansible | changed: [localhost] => (item=clearpassword) => { | |
"ansible_loop_var": "item", | |
"changed": true, | |
"invocation": { | |
"module_args": { | |
"ca_cert": null, | |
"comment": null, | |
"conn_limit": null, | |
"db": "", | |
"encrypted": true, | |
"expires": null, | |
"fail_on_user": true, | |
"groups": null, | |
"login_host": "", | |
"login_password": "", | |
"login_unix_socket": "", | |
"login_user": "postgres", | |
"name": "clearpassword", | |
"no_password_changes": false, | |
"password": null, | |
"port": 5432, | |
"priv": null, | |
"role_attr_flags": "", | |
"session_role": null, | |
"ssl_mode": "prefer", | |
"state": "absent", | |
"trust_input": true, | |
"user": "clearpassword" | |
} | |
}, | |
"item": { | |
"name": "clearpassword", | |
"password": "swordfish" | |
}, | |
"queries": [ | |
"DROP USER \"clearpassword\"" | |
], | |
"user": "clearpassword", | |
"user_removed": true | |
} | |
2022-06-27 15:17:41,152 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521 `" && echo ansible-tmp-1656307061.1523507-2312812-73910500245521="` echo /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521 `" ) && sleep 0' | |
2022-06-27 15:17:41,182 p=2312812 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_user.py | |
2022-06-27 15:17:41,183 p=2312812 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmptlrctzhl TO /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521/AnsiballZ_postgresql_user.py | |
2022-06-27 15:17:41,189 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521/ /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521/AnsiballZ_postgresql_user.py && sleep 0' | |
2022-06-27 15:17:41,206 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-dggfusuxfrwkcozjuucjjrvyrifdnjpb ; /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521/AnsiballZ_postgresql_user.py'"'"' && sleep 0' | |
2022-06-27 15:17:41,526 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521/ > /dev/null 2>&1 && sleep 0' | |
2022-06-27 15:17:41,547 p=2312675 u=ben n=ansible | changed: [localhost] => (item=scrampassword) => { | |
"ansible_loop_var": "item", | |
"changed": true, | |
"invocation": { | |
"module_args": { | |
"ca_cert": null, | |
"comment": null, | |
"conn_limit": null, | |
"db": "", | |
"encrypted": true, | |
"expires": null, | |
"fail_on_user": true, | |
"groups": null, | |
"login_host": "", | |
"login_password": "", | |
"login_unix_socket": "", | |
"login_user": "postgres", | |
"name": "scrampassword", | |
"no_password_changes": false, | |
"password": null, | |
"port": 5432, | |
"priv": null, | |
"role_attr_flags": "", | |
"session_role": null, | |
"ssl_mode": "prefer", | |
"state": "absent", | |
"trust_input": true, | |
"user": "scrampassword" | |
} | |
}, | |
"item": { | |
"name": "scrampassword", | |
"password": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8=" | |
}, | |
"queries": [ | |
"DROP USER \"scrampassword\"" | |
], | |
"user": "scrampassword", | |
"user_removed": true | |
} | |
2022-06-27 15:17:41,558 p=2312675 u=ben n=ansible | TASK [Create users] ****************************************************************************************************************************************** | |
2022-06-27 15:17:41,578 p=2312852 u=ben n=ansible | <localhost> ESTABLISH LOCAL CONNECTION FOR USER: ben | |
2022-06-27 15:17:41,579 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0' | |
2022-06-27 15:17:41,594 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978 `" && echo ansible-tmp-1656307061.5933301-2312852-49650024276978="` echo /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978 `" ) && sleep 0' | |
2022-06-27 15:17:41,619 p=2312852 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_user.py | |
2022-06-27 15:17:41,620 p=2312852 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmpq7wy9c0l TO /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978/AnsiballZ_postgresql_user.py | |
2022-06-27 15:17:41,627 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978/ /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978/AnsiballZ_postgresql_user.py && sleep 0' | |
2022-06-27 15:17:41,646 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-switqqwosfvkafdufnbdzafwcbbsahjf ; PGOPTIONS='"'"'"'"'"'"'"'"'-c password_encryption=scram-sha-256'"'"'"'"'"'"'"'"' /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978/AnsiballZ_postgresql_user.py'"'"' && sleep 0' | |
2022-06-27 15:17:41,976 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978/ > /dev/null 2>&1 && sleep 0' | |
2022-06-27 15:17:42,000 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0' | |
2022-06-27 15:17:42,000 p=2312675 u=ben n=ansible | changed: [localhost] => (item=clearpassword) => { | |
"ansible_loop_var": "item", | |
"changed": true, | |
"invocation": { | |
"module_args": { | |
"ca_cert": null, | |
"comment": null, | |
"conn_limit": null, | |
"db": "", | |
"encrypted": true, | |
"expires": null, | |
"fail_on_user": true, | |
"groups": null, | |
"login_host": "", | |
"login_password": "", | |
"login_unix_socket": "", | |
"login_user": "postgres", | |
"name": "clearpassword", | |
"no_password_changes": false, | |
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER", | |
"port": 5432, | |
"priv": null, | |
"role_attr_flags": "", | |
"session_role": null, | |
"ssl_mode": "prefer", | |
"state": "present", | |
"trust_input": true, | |
"user": "clearpassword" | |
} | |
}, | |
"item": { | |
"name": "clearpassword", | |
"password": "swordfish" | |
}, | |
"queries": [ | |
"CREATE USER \"clearpassword\" WITH ENCRYPTED PASSWORD %(password)s " | |
], | |
"user": "clearpassword" | |
} | |
2022-06-27 15:17:42,014 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160 `" && echo ansible-tmp-1656307062.0136654-2312852-41911502601160="` echo /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160 `" ) && sleep 0' | |
2022-06-27 15:17:42,039 p=2312852 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_user.py | |
2022-06-27 15:17:42,040 p=2312852 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmpg__co5n7 TO /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160/AnsiballZ_postgresql_user.py | |
2022-06-27 15:17:42,047 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160/ /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160/AnsiballZ_postgresql_user.py && sleep 0' | |
2022-06-27 15:17:42,063 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-qdfrwjadoszuobayhbalqsssrvohcqge ; PGOPTIONS='"'"'"'"'"'"'"'"'-c password_encryption=scram-sha-256'"'"'"'"'"'"'"'"' /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160/AnsiballZ_postgresql_user.py'"'"' && sleep 0' | |
2022-06-27 15:17:42,382 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160/ > /dev/null 2>&1 && sleep 0' | |
2022-06-27 15:17:42,401 p=2312675 u=ben n=ansible | changed: [localhost] => (item=scrampassword) => { | |
"ansible_loop_var": "item", | |
"changed": true, | |
"invocation": { | |
"module_args": { | |
"ca_cert": null, | |
"comment": null, | |
"conn_limit": null, | |
"db": "", | |
"encrypted": true, | |
"expires": null, | |
"fail_on_user": true, | |
"groups": null, | |
"login_host": "", | |
"login_password": "", | |
"login_unix_socket": "", | |
"login_user": "postgres", | |
"name": "scrampassword", | |
"no_password_changes": false, | |
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER", | |
"port": 5432, | |
"priv": null, | |
"role_attr_flags": "", | |
"session_role": null, | |
"ssl_mode": "prefer", | |
"state": "present", | |
"trust_input": true, | |
"user": "scrampassword" | |
} | |
}, | |
"item": { | |
"name": "scrampassword", | |
"password": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8=" | |
}, | |
"queries": [ | |
"CREATE USER \"scrampassword\" WITH ENCRYPTED PASSWORD %(password)s " | |
], | |
"user": "scrampassword" | |
} | |
2022-06-27 15:17:42,412 p=2312675 u=ben n=ansible | TASK [Create users - again] ********************************************************************************************************************************** | |
2022-06-27 15:17:42,431 p=2312890 u=ben n=ansible | <localhost> ESTABLISH LOCAL CONNECTION FOR USER: ben | |
2022-06-27 15:17:42,432 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0' | |
2022-06-27 15:17:42,445 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624 `" && echo ansible-tmp-1656307062.4454274-2312890-176899937664624="` echo /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624 `" ) && sleep 0' | |
2022-06-27 15:17:42,473 p=2312890 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_user.py | |
2022-06-27 15:17:42,474 p=2312890 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmpqar109yd TO /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624/AnsiballZ_postgresql_user.py | |
2022-06-27 15:17:42,481 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624/ /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624/AnsiballZ_postgresql_user.py && sleep 0' | |
2022-06-27 15:17:42,499 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-oxyxenoesdmacidmzcagfjdnbjprqmty ; PGOPTIONS='"'"'"'"'"'"'"'"'-c password_encryption=scram-sha-256'"'"'"'"'"'"'"'"' /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624/AnsiballZ_postgresql_user.py'"'"' && sleep 0' | |
2022-06-27 15:17:42,824 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624/ > /dev/null 2>&1 && sleep 0' | |
2022-06-27 15:17:42,849 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0' | |
2022-06-27 15:17:42,850 p=2312675 u=ben n=ansible | ok: [localhost] => (item=clearpassword) => { | |
"ansible_loop_var": "item", | |
"changed": false, | |
"invocation": { | |
"module_args": { | |
"ca_cert": null, | |
"comment": null, | |
"conn_limit": null, | |
"db": "", | |
"encrypted": true, | |
"expires": null, | |
"fail_on_user": true, | |
"groups": null, | |
"login_host": "", | |
"login_password": "", | |
"login_unix_socket": "", | |
"login_user": "postgres", | |
"name": "clearpassword", | |
"no_password_changes": false, | |
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER", | |
"port": 5432, | |
"priv": null, | |
"role_attr_flags": "", | |
"session_role": null, | |
"ssl_mode": "prefer", | |
"state": "present", | |
"trust_input": true, | |
"user": "clearpassword" | |
} | |
}, | |
"item": { | |
"name": "clearpassword", | |
"password": "swordfish" | |
}, | |
"queries": [], | |
"user": "clearpassword" | |
} | |
2022-06-27 15:17:42,862 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798 `" && echo ansible-tmp-1656307062.8623638-2312890-122576783185798="` echo /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798 `" ) && sleep 0' | |
2022-06-27 15:17:42,887 p=2312890 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_user.py | |
2022-06-27 15:17:42,888 p=2312890 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmp6b3n39ox TO /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798/AnsiballZ_postgresql_user.py | |
2022-06-27 15:17:42,895 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798/ /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798/AnsiballZ_postgresql_user.py && sleep 0' | |
2022-06-27 15:17:42,912 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-bkehljxzcoaxdjfgucikvfgrayfdhnmn ; PGOPTIONS='"'"'"'"'"'"'"'"'-c password_encryption=scram-sha-256'"'"'"'"'"'"'"'"' /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798/AnsiballZ_postgresql_user.py'"'"' && sleep 0' | |
2022-06-27 15:17:43,243 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798/ > /dev/null 2>&1 && sleep 0' | |
2022-06-27 15:17:43,262 p=2312675 u=ben n=ansible | changed: [localhost] => (item=scrampassword) => { | |
"ansible_loop_var": "item", | |
"changed": true, | |
"invocation": { | |
"module_args": { | |
"ca_cert": null, | |
"comment": null, | |
"conn_limit": null, | |
"db": "", | |
"encrypted": true, | |
"expires": null, | |
"fail_on_user": true, | |
"groups": null, | |
"login_host": "", | |
"login_password": "", | |
"login_unix_socket": "", | |
"login_user": "postgres", | |
"name": "scrampassword", | |
"no_password_changes": false, | |
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER", | |
"port": 5432, | |
"priv": null, | |
"role_attr_flags": "", | |
"session_role": null, | |
"ssl_mode": "prefer", | |
"state": "present", | |
"trust_input": true, | |
"user": "scrampassword" | |
} | |
}, | |
"item": { | |
"name": "scrampassword", | |
"password": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8=" | |
}, | |
"queries": [], | |
"user": "scrampassword" | |
} | |
2022-06-27 15:17:43,273 p=2312675 u=ben n=ansible | TASK [Get password of user scrampassword] ******************************************************************************************************************** | |
2022-06-27 15:17:43,287 p=2312930 u=ben n=ansible | <localhost> ESTABLISH LOCAL CONNECTION FOR USER: ben | |
2022-06-27 15:17:43,288 p=2312930 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0' | |
2022-06-27 15:17:43,303 p=2312930 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014 `" && echo ansible-tmp-1656307063.302608-2312930-187391231342014="` echo /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014 `" ) && sleep 0' | |
2022-06-27 15:17:43,498 p=2312930 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_query.py | |
2022-06-27 15:17:43,499 p=2312930 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmp4dfv01bo TO /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014/AnsiballZ_postgresql_query.py | |
2022-06-27 15:17:43,507 p=2312930 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014/ /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014/AnsiballZ_postgresql_query.py && sleep 0' | |
2022-06-27 15:17:43,524 p=2312930 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-uloteekpgwepojlwslcuwklimxeihfzh ; /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014/AnsiballZ_postgresql_query.py'"'"' && sleep 0' | |
2022-06-27 15:17:43,837 p=2312930 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014/ > /dev/null 2>&1 && sleep 0' | |
2022-06-27 15:17:43,857 p=2312675 u=ben n=ansible | ok: [localhost] => { | |
"changed": false, | |
"invocation": { | |
"module_args": { | |
"as_single_query": true, | |
"autocommit": false, | |
"ca_cert": null, | |
"db": "postgres", | |
"encoding": null, | |
"login_host": "", | |
"login_password": "", | |
"login_unix_socket": "", | |
"login_user": "postgres", | |
"named_args": null, | |
"path_to_script": null, | |
"port": 5432, | |
"positional_args": null, | |
"query": "SELECT rolpassword FROM pg_authid WHERE rolname='scrampassword';", | |
"search_path": null, | |
"session_role": null, | |
"ssl_mode": "prefer", | |
"trust_input": true | |
} | |
}, | |
"query": "SELECT rolpassword FROM pg_authid WHERE rolname='scrampassword';", | |
"query_all_results": [ | |
[ | |
{ | |
"rolpassword": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8=" | |
} | |
] | |
], | |
"query_list": [ | |
"SELECT rolpassword FROM pg_authid WHERE rolname='scrampassword';" | |
], | |
"query_result": [ | |
{ | |
"rolpassword": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8=" | |
} | |
], | |
"rowcount": 1, | |
"statusmessage": "SELECT 1" | |
} | |
2022-06-27 15:17:43,867 p=2312675 u=ben n=ansible | TASK [Assert that given password is the same as the stored password] ***************************************************************************************** | |
2022-06-27 15:17:43,904 p=2312675 u=ben n=ansible | ok: [localhost] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
2022-06-27 15:17:43,914 p=2312675 u=ben n=ansible | TASK [Assert that users were not changed the second time] **************************************************************************************************** | |
2022-06-27 15:17:43,939 p=2312675 u=ben n=ansible | ok: [localhost] => (item={'user': 'clearpassword', 'changed': False, 'queries': [], 'invocation': {'module_args': {'name': 'clearpassword', 'password': 'VALUE_SPECIFIED_IN_NO_LOG_PARAMETER', 'user': 'clearpassword', 'login_user': 'postgres', 'login_password': '', 'login_host': '', 'login_unix_socket': '', 'port': 5432, 'ssl_mode': 'prefer', 'state': 'present', 'db': '', 'fail_on_user': True, 'role_attr_flags': '', 'encrypted': True, 'no_password_changes': False, 'trust_input': True, 'ca_cert': None, 'priv': None, 'expires': None, 'conn_limit': None, 'session_role': None, 'groups': None, 'comment': None}}, 'failed': False, 'item': {'name': 'clearpassword', 'password': 'swordfish'}, 'ansible_loop_var': 'item'}) => { | |
"ansible_loop_var": "item", | |
"changed": false, | |
"item": { | |
"ansible_loop_var": "item", | |
"changed": false, | |
"failed": false, | |
"invocation": { | |
"module_args": { | |
"ca_cert": null, | |
"comment": null, | |
"conn_limit": null, | |
"db": "", | |
"encrypted": true, | |
"expires": null, | |
"fail_on_user": true, | |
"groups": null, | |
"login_host": "", | |
"login_password": "", | |
"login_unix_socket": "", | |
"login_user": "postgres", | |
"name": "clearpassword", | |
"no_password_changes": false, | |
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER", | |
"port": 5432, | |
"priv": null, | |
"role_attr_flags": "", | |
"session_role": null, | |
"ssl_mode": "prefer", | |
"state": "present", | |
"trust_input": true, | |
"user": "clearpassword" | |
} | |
}, | |
"item": { | |
"name": "clearpassword", | |
"password": "swordfish" | |
}, | |
"queries": [], | |
"user": "clearpassword" | |
}, | |
"msg": "All assertions passed" | |
} | |
2022-06-27 15:17:43,941 p=2312675 u=ben n=ansible | failed: [localhost] (item={'user': 'scrampassword', 'changed': True, 'queries': [], 'invocation': {'module_args': {'name': 'scrampassword', 'password': 'VALUE_SPECIFIED_IN_NO_LOG_PARAMETER', 'user': 'scrampassword', 'login_user': 'postgres', 'login_password': '', 'login_host': '', 'login_unix_socket': '', 'port': 5432, 'ssl_mode': 'prefer', 'state': 'present', 'db': '', 'fail_on_user': True, 'role_attr_flags': '', 'encrypted': True, 'no_password_changes': False, 'trust_input': True, 'ca_cert': None, 'priv': None, 'expires': None, 'conn_limit': None, 'session_role': None, 'groups': None, 'comment': None}}, 'failed': False, 'item': {'name': 'scrampassword', 'password': 'SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8='}, 'ansible_loop_var': 'item'}) => { | |
"ansible_loop_var": "item", | |
"assertion": "item.changed == False", | |
"changed": false, | |
"evaluated_to": false, | |
"item": { | |
"ansible_loop_var": "item", | |
"changed": true, | |
"failed": false, | |
"invocation": { | |
"module_args": { | |
"ca_cert": null, | |
"comment": null, | |
"conn_limit": null, | |
"db": "", | |
"encrypted": true, | |
"expires": null, | |
"fail_on_user": true, | |
"groups": null, | |
"login_host": "", | |
"login_password": "", | |
"login_unix_socket": "", | |
"login_user": "postgres", | |
"name": "scrampassword", | |
"no_password_changes": false, | |
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER", | |
"port": 5432, | |
"priv": null, | |
"role_attr_flags": "", | |
"session_role": null, | |
"ssl_mode": "prefer", | |
"state": "present", | |
"trust_input": true, | |
"user": "scrampassword" | |
} | |
}, | |
"item": { | |
"name": "scrampassword", | |
"password": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8=" | |
}, | |
"queries": [], | |
"user": "scrampassword" | |
}, | |
"msg": "Assertion failed" | |
} | |
2022-06-27 15:17:43,943 p=2312675 u=ben n=ansible | ...ignoring | |
2022-06-27 15:17:43,952 p=2312675 u=ben n=ansible | META: ran handlers | |
2022-06-27 15:17:43,960 p=2312675 u=ben n=ansible | META: ran handlers | |
2022-06-27 15:17:43,962 p=2312675 u=ben n=ansible | PLAY RECAP *************************************************************************************************************************************************** | |
2022-06-27 15:17:43,962 p=2312675 u=ben n=ansible | localhost : ok=7 changed=3 unreachable=0 failed=0 skipped=0 rescued=0 ignored=1 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment