Skip to content

Instantly share code, notes, and snippets.

@benformosa
Last active June 27, 2022 05:20
Show Gist options
  • Save benformosa/e6b95b09f0d55377738a6ff85d4189c9 to your computer and use it in GitHub Desktop.
Save benformosa/e6b95b09f0d55377738a6ff85d4189c9 to your computer and use it in GitHub Desktop.
Test idempotency of postgresql_user module with SCRAM password
2022-06-27 15:15:35,080 p=2312317 u=ben n=ansible | PLAY [Test idempotency of postgresql_user module with SCRAM password] ****************************************************************************************
2022-06-27 15:15:35,092 p=2312317 u=ben n=ansible | TASK [Gathering Facts] ***************************************************************************************************************************************
2022-06-27 15:15:36,959 p=2312317 u=ben n=ansible | ok: [localhost]
2022-06-27 15:15:36,978 p=2312317 u=ben n=ansible | TASK [Remove test users] *************************************************************************************************************************************
2022-06-27 15:15:37,596 p=2312317 u=ben n=ansible | ok: [localhost] => (item=clearpassword)
2022-06-27 15:15:38,003 p=2312317 u=ben n=ansible | ok: [localhost] => (item=scrampassword)
2022-06-27 15:15:38,014 p=2312317 u=ben n=ansible | TASK [Create users] ******************************************************************************************************************************************
2022-06-27 15:15:38,458 p=2312317 u=ben n=ansible | changed: [localhost] => (item=clearpassword)
2022-06-27 15:15:38,872 p=2312317 u=ben n=ansible | changed: [localhost] => (item=scrampassword)
2022-06-27 15:15:38,882 p=2312317 u=ben n=ansible | TASK [Create users - again] **********************************************************************************************************************************
2022-06-27 15:15:39,314 p=2312317 u=ben n=ansible | ok: [localhost] => (item=clearpassword)
2022-06-27 15:15:39,723 p=2312317 u=ben n=ansible | changed: [localhost] => (item=scrampassword)
2022-06-27 15:15:39,734 p=2312317 u=ben n=ansible | TASK [Get password of user scrampassword] ********************************************************************************************************************
2022-06-27 15:15:40,329 p=2312317 u=ben n=ansible | ok: [localhost]
2022-06-27 15:15:40,340 p=2312317 u=ben n=ansible | TASK [Assert that given password is the same as the stored password] *****************************************************************************************
2022-06-27 15:15:40,377 p=2312317 u=ben n=ansible | ok: [localhost] => {
"changed": false,
"msg": "All assertions passed"
}
2022-06-27 15:15:40,388 p=2312317 u=ben n=ansible | TASK [Assert that users were not changed the second time] ****************************************************************************************************
2022-06-27 15:15:40,412 p=2312317 u=ben n=ansible | ok: [localhost] => (item={'user': 'clearpassword', 'changed': False, 'queries': [], 'invocation': {'module_args': {'name': 'clearpassword', 'password': 'VALUE_SPECIFIED_IN_NO_LOG_PARAMETER', 'user': 'clearpassword', 'login_user': 'postgres', 'login_password': '', 'login_host': '', 'login_unix_socket': '', 'port': 5432, 'ssl_mode': 'prefer', 'state': 'present', 'db': '', 'fail_on_user': True, 'role_attr_flags': '', 'encrypted': True, 'no_password_changes': False, 'trust_input': True, 'ca_cert': None, 'priv': None, 'expires': None, 'conn_limit': None, 'session_role': None, 'groups': None, 'comment': None}}, 'failed': False, 'item': {'name': 'clearpassword', 'password': 'swordfish'}, 'ansible_loop_var': 'item'}) => {
"ansible_loop_var": "item",
"changed": false,
"item": {
"ansible_loop_var": "item",
"changed": false,
"failed": false,
"invocation": {
"module_args": {
"ca_cert": null,
"comment": null,
"conn_limit": null,
"db": "",
"encrypted": true,
"expires": null,
"fail_on_user": true,
"groups": null,
"login_host": "",
"login_password": "",
"login_unix_socket": "",
"login_user": "postgres",
"name": "clearpassword",
"no_password_changes": false,
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
"port": 5432,
"priv": null,
"role_attr_flags": "",
"session_role": null,
"ssl_mode": "prefer",
"state": "present",
"trust_input": true,
"user": "clearpassword"
}
},
"item": {
"name": "clearpassword",
"password": "swordfish"
},
"queries": [],
"user": "clearpassword"
},
"msg": "All assertions passed"
}
2022-06-27 15:15:40,416 p=2312317 u=ben n=ansible | failed: [localhost] (item={'user': 'scrampassword', 'changed': True, 'queries': [], 'invocation': {'module_args': {'name': 'scrampassword', 'password': 'VALUE_SPECIFIED_IN_NO_LOG_PARAMETER', 'user': 'scrampassword', 'login_user': 'postgres', 'login_password': '', 'login_host': '', 'login_unix_socket': '', 'port': 5432, 'ssl_mode': 'prefer', 'state': 'present', 'db': '', 'fail_on_user': True, 'role_attr_flags': '', 'encrypted': True, 'no_password_changes': False, 'trust_input': True, 'ca_cert': None, 'priv': None, 'expires': None, 'conn_limit': None, 'session_role': None, 'groups': None, 'comment': None}}, 'failed': False, 'item': {'name': 'scrampassword', 'password': 'SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8='}, 'ansible_loop_var': 'item'}) => {
"ansible_loop_var": "item",
"assertion": "item.changed == False",
"changed": false,
"evaluated_to": false,
"item": {
"ansible_loop_var": "item",
"changed": true,
"failed": false,
"invocation": {
"module_args": {
"ca_cert": null,
"comment": null,
"conn_limit": null,
"db": "",
"encrypted": true,
"expires": null,
"fail_on_user": true,
"groups": null,
"login_host": "",
"login_password": "",
"login_unix_socket": "",
"login_user": "postgres",
"name": "scrampassword",
"no_password_changes": false,
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
"port": 5432,
"priv": null,
"role_attr_flags": "",
"session_role": null,
"ssl_mode": "prefer",
"state": "present",
"trust_input": true,
"user": "scrampassword"
}
},
"item": {
"name": "scrampassword",
"password": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8="
},
"queries": [],
"user": "scrampassword"
},
"msg": "Assertion failed"
}
2022-06-27 15:15:40,418 p=2312317 u=ben n=ansible | ...ignoring
2022-06-27 15:15:40,437 p=2312317 u=ben n=ansible | PLAY RECAP ***************************************************************************************************************************************************
2022-06-27 15:15:40,437 p=2312317 u=ben n=ansible | localhost : ok=7 changed=2 unreachable=0 failed=0 skipped=0 rescued=0 ignored=1
---
- name: Test idempotency of postgresql_user module with SCRAM password
hosts: localhost
vars:
scrampassword: SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8=
users:
- name: clearpassword
password: swordfish
- name: scrampassword
password: "{{ scrampassword }}"
tasks:
- name: Remove test users
community.postgresql.postgresql_user:
name: "{{ item.name }}"
state: absent
become: true
become_user: postgres
loop: "{{ users }}"
loop_control:
label: "{{ item.name }}"
- name: Create users
community.postgresql.postgresql_user:
name: "{{ item.name }}"
password: "{{ item.password }}"
become: true
become_user: postgres
loop: "{{ users }}"
loop_control:
label: "{{ item.name }}"
environment:
PGOPTIONS: "-c password_encryption=scram-sha-256"
- name: Create users - again
community.postgresql.postgresql_user:
name: "{{ item.name }}"
password: "{{ item.password }}"
become: true
become_user: postgres
loop: "{{ users }}"
loop_control:
label: "{{ item.name }}"
environment:
PGOPTIONS: "-c password_encryption=scram-sha-256"
register: users_again
- name: Get password of user scrampassword
community.postgresql.postgresql_query:
db: postgres
query: "SELECT rolpassword FROM pg_authid WHERE rolname='scrampassword';"
become: true
become_user: postgres
register: query
- name: Assert that given password is the same as the stored password
ansible.builtin.assert:
that:
- db_password == scrampassword
vars:
db_password: "{{ (query.query_result | first)['rolpassword'] }}"
- name: Assert that users were not changed the second time
ansible.builtin.assert:
that:
- item.changed == False
loop: "{{ users_again.results }}"
ignore_errors: true
2022-06-27 15:17:38,848 p=2312675 u=ben n=ansible | ansible-playbook [core 2.12.2]
config file = /home/ben/.ansible.cfg
configured module search path = ['/home/ben/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules']
ansible python module location = /usr/lib/python3.8/site-packages/ansible
ansible collection location = /home/ben/.ansible/collections:/usr/share/ansible/collections
executable location = /usr/bin/ansible-playbook
python version = 3.8.12 (default, Sep 16 2021, 10:46:05) [GCC 8.5.0 20210514 (Red Hat 8.5.0-3)]
jinja version = 2.10.3
libyaml = True
2022-06-27 15:17:38,848 p=2312675 u=ben n=ansible | Using /home/ben/.ansible.cfg as config file
2022-06-27 15:17:38,856 p=2312675 u=ben n=ansible | host_list declined parsing /home/ben/git/ansible/inventory.ini as it did not pass its verify_file() method
2022-06-27 15:17:38,856 p=2312675 u=ben n=ansible | script declined parsing /home/ben/git/ansible/inventory.ini as it did not pass its verify_file() method
2022-06-27 15:17:38,856 p=2312675 u=ben n=ansible | auto declined parsing /home/ben/git/ansible/inventory.ini as it did not pass its verify_file() method
2022-06-27 15:17:38,856 p=2312675 u=ben n=ansible | yaml declined parsing /home/ben/git/ansible/inventory.ini as it did not pass its verify_file() method
2022-06-27 15:17:38,858 p=2312675 u=ben n=ansible | Parsed /home/ben/git/ansible/inventory.ini inventory source with ini plugin
2022-06-27 15:17:38,990 p=2312675 u=ben n=ansible | Skipping callback 'default', as we already have a stdout callback.
2022-06-27 15:17:38,990 p=2312675 u=ben n=ansible | Skipping callback 'minimal', as we already have a stdout callback.
2022-06-27 15:17:38,990 p=2312675 u=ben n=ansible | Skipping callback 'oneline', as we already have a stdout callback.
2022-06-27 15:17:38,990 p=2312675 u=ben n=ansible | PLAYBOOK: play_postgres_user.yml *****************************************************************************************************************************
2022-06-27 15:17:38,990 p=2312675 u=ben n=ansible | 1 plays in play_postgres_user.yml
2022-06-27 15:17:38,992 p=2312675 u=ben n=ansible | PLAY [Test idempotency of postgresql_user module with SCRAM password] ****************************************************************************************
2022-06-27 15:17:39,004 p=2312675 u=ben n=ansible | TASK [Gathering Facts] ***************************************************************************************************************************************
2022-06-27 15:17:39,019 p=2312680 u=ben n=ansible | <localhost> ESTABLISH LOCAL CONNECTION FOR USER: ben
2022-06-27 15:17:39,019 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0'
2022-06-27 15:17:39,038 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /home/ben/.ansible/tmp `"&& mkdir "` echo /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676 `" && echo ansible-tmp-1656307059.0375886-2312680-170081346281676="` echo /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676 `" ) && sleep 0'
2022-06-27 15:17:39,387 p=2312680 u=ben n=ansible | <localhost> Attempting python interpreter discovery
2022-06-27 15:17:39,387 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo PLATFORM; uname; echo FOUND; command -v '"'"'python3.10'"'"'; command -v '"'"'python3.9'"'"'; command -v '"'"'python3.8'"'"'; command -v '"'"'python3.7'"'"'; command -v '"'"'python3.6'"'"'; command -v '"'"'python3.5'"'"'; command -v '"'"'/usr/bin/python3'"'"'; command -v '"'"'/usr/libexec/platform-python'"'"'; command -v '"'"'python2.7'"'"'; command -v '"'"'python2.6'"'"'; command -v '"'"'/usr/bin/python'"'"'; command -v '"'"'python'"'"'; echo ENDFOUND && sleep 0'
2022-06-27 15:17:39,405 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c '/usr/bin/python3.8 && sleep 0'
2022-06-27 15:17:39,464 p=2312680 u=ben n=ansible | Using module file /usr/lib/python3.8/site-packages/ansible/modules/setup.py
2022-06-27 15:17:39,465 p=2312680 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmp2ixxco2p TO /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676/AnsiballZ_setup.py
2022-06-27 15:17:39,475 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'chmod u+x /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676/ /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676/AnsiballZ_setup.py && sleep 0'
2022-06-27 15:17:39,492 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c '/usr/libexec/platform-python /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676/AnsiballZ_setup.py && sleep 0'
2022-06-27 15:17:40,457 p=2312680 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /home/ben/.ansible/tmp/ansible-tmp-1656307059.0375886-2312680-170081346281676/ > /dev/null 2>&1 && sleep 0'
2022-06-27 15:17:40,496 p=2312675 u=ben n=ansible | ok: [localhost]
2022-06-27 15:17:40,506 p=2312675 u=ben n=ansible | META: ran handlers
2022-06-27 15:17:40,515 p=2312675 u=ben n=ansible | TASK [Remove test users] *************************************************************************************************************************************
2022-06-27 15:17:40,534 p=2312812 u=ben n=ansible | <localhost> ESTABLISH LOCAL CONNECTION FOR USER: ben
2022-06-27 15:17:40,534 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0'
2022-06-27 15:17:40,549 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759 `" && echo ansible-tmp-1656307060.5489478-2312812-238008988160759="` echo /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759 `" ) && sleep 0'
2022-06-27 15:17:40,759 p=2312812 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_user.py
2022-06-27 15:17:40,760 p=2312812 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmpuua10m9s TO /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759/AnsiballZ_postgresql_user.py
2022-06-27 15:17:40,768 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759/ /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759/AnsiballZ_postgresql_user.py && sleep 0'
2022-06-27 15:17:40,785 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-qacvzdlerhjzjamggpysraayvvkwmaxr ; /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759/AnsiballZ_postgresql_user.py'"'"' && sleep 0'
2022-06-27 15:17:41,115 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307060.5489478-2312812-238008988160759/ > /dev/null 2>&1 && sleep 0'
2022-06-27 15:17:41,139 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0'
2022-06-27 15:17:41,139 p=2312675 u=ben n=ansible | changed: [localhost] => (item=clearpassword) => {
"ansible_loop_var": "item",
"changed": true,
"invocation": {
"module_args": {
"ca_cert": null,
"comment": null,
"conn_limit": null,
"db": "",
"encrypted": true,
"expires": null,
"fail_on_user": true,
"groups": null,
"login_host": "",
"login_password": "",
"login_unix_socket": "",
"login_user": "postgres",
"name": "clearpassword",
"no_password_changes": false,
"password": null,
"port": 5432,
"priv": null,
"role_attr_flags": "",
"session_role": null,
"ssl_mode": "prefer",
"state": "absent",
"trust_input": true,
"user": "clearpassword"
}
},
"item": {
"name": "clearpassword",
"password": "swordfish"
},
"queries": [
"DROP USER \"clearpassword\""
],
"user": "clearpassword",
"user_removed": true
}
2022-06-27 15:17:41,152 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521 `" && echo ansible-tmp-1656307061.1523507-2312812-73910500245521="` echo /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521 `" ) && sleep 0'
2022-06-27 15:17:41,182 p=2312812 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_user.py
2022-06-27 15:17:41,183 p=2312812 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmptlrctzhl TO /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521/AnsiballZ_postgresql_user.py
2022-06-27 15:17:41,189 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521/ /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521/AnsiballZ_postgresql_user.py && sleep 0'
2022-06-27 15:17:41,206 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-dggfusuxfrwkcozjuucjjrvyrifdnjpb ; /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521/AnsiballZ_postgresql_user.py'"'"' && sleep 0'
2022-06-27 15:17:41,526 p=2312812 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307061.1523507-2312812-73910500245521/ > /dev/null 2>&1 && sleep 0'
2022-06-27 15:17:41,547 p=2312675 u=ben n=ansible | changed: [localhost] => (item=scrampassword) => {
"ansible_loop_var": "item",
"changed": true,
"invocation": {
"module_args": {
"ca_cert": null,
"comment": null,
"conn_limit": null,
"db": "",
"encrypted": true,
"expires": null,
"fail_on_user": true,
"groups": null,
"login_host": "",
"login_password": "",
"login_unix_socket": "",
"login_user": "postgres",
"name": "scrampassword",
"no_password_changes": false,
"password": null,
"port": 5432,
"priv": null,
"role_attr_flags": "",
"session_role": null,
"ssl_mode": "prefer",
"state": "absent",
"trust_input": true,
"user": "scrampassword"
}
},
"item": {
"name": "scrampassword",
"password": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8="
},
"queries": [
"DROP USER \"scrampassword\""
],
"user": "scrampassword",
"user_removed": true
}
2022-06-27 15:17:41,558 p=2312675 u=ben n=ansible | TASK [Create users] ******************************************************************************************************************************************
2022-06-27 15:17:41,578 p=2312852 u=ben n=ansible | <localhost> ESTABLISH LOCAL CONNECTION FOR USER: ben
2022-06-27 15:17:41,579 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0'
2022-06-27 15:17:41,594 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978 `" && echo ansible-tmp-1656307061.5933301-2312852-49650024276978="` echo /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978 `" ) && sleep 0'
2022-06-27 15:17:41,619 p=2312852 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_user.py
2022-06-27 15:17:41,620 p=2312852 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmpq7wy9c0l TO /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978/AnsiballZ_postgresql_user.py
2022-06-27 15:17:41,627 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978/ /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978/AnsiballZ_postgresql_user.py && sleep 0'
2022-06-27 15:17:41,646 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-switqqwosfvkafdufnbdzafwcbbsahjf ; PGOPTIONS='"'"'"'"'"'"'"'"'-c password_encryption=scram-sha-256'"'"'"'"'"'"'"'"' /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978/AnsiballZ_postgresql_user.py'"'"' && sleep 0'
2022-06-27 15:17:41,976 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307061.5933301-2312852-49650024276978/ > /dev/null 2>&1 && sleep 0'
2022-06-27 15:17:42,000 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0'
2022-06-27 15:17:42,000 p=2312675 u=ben n=ansible | changed: [localhost] => (item=clearpassword) => {
"ansible_loop_var": "item",
"changed": true,
"invocation": {
"module_args": {
"ca_cert": null,
"comment": null,
"conn_limit": null,
"db": "",
"encrypted": true,
"expires": null,
"fail_on_user": true,
"groups": null,
"login_host": "",
"login_password": "",
"login_unix_socket": "",
"login_user": "postgres",
"name": "clearpassword",
"no_password_changes": false,
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
"port": 5432,
"priv": null,
"role_attr_flags": "",
"session_role": null,
"ssl_mode": "prefer",
"state": "present",
"trust_input": true,
"user": "clearpassword"
}
},
"item": {
"name": "clearpassword",
"password": "swordfish"
},
"queries": [
"CREATE USER \"clearpassword\" WITH ENCRYPTED PASSWORD %(password)s "
],
"user": "clearpassword"
}
2022-06-27 15:17:42,014 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160 `" && echo ansible-tmp-1656307062.0136654-2312852-41911502601160="` echo /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160 `" ) && sleep 0'
2022-06-27 15:17:42,039 p=2312852 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_user.py
2022-06-27 15:17:42,040 p=2312852 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmpg__co5n7 TO /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160/AnsiballZ_postgresql_user.py
2022-06-27 15:17:42,047 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160/ /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160/AnsiballZ_postgresql_user.py && sleep 0'
2022-06-27 15:17:42,063 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-qdfrwjadoszuobayhbalqsssrvohcqge ; PGOPTIONS='"'"'"'"'"'"'"'"'-c password_encryption=scram-sha-256'"'"'"'"'"'"'"'"' /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160/AnsiballZ_postgresql_user.py'"'"' && sleep 0'
2022-06-27 15:17:42,382 p=2312852 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307062.0136654-2312852-41911502601160/ > /dev/null 2>&1 && sleep 0'
2022-06-27 15:17:42,401 p=2312675 u=ben n=ansible | changed: [localhost] => (item=scrampassword) => {
"ansible_loop_var": "item",
"changed": true,
"invocation": {
"module_args": {
"ca_cert": null,
"comment": null,
"conn_limit": null,
"db": "",
"encrypted": true,
"expires": null,
"fail_on_user": true,
"groups": null,
"login_host": "",
"login_password": "",
"login_unix_socket": "",
"login_user": "postgres",
"name": "scrampassword",
"no_password_changes": false,
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
"port": 5432,
"priv": null,
"role_attr_flags": "",
"session_role": null,
"ssl_mode": "prefer",
"state": "present",
"trust_input": true,
"user": "scrampassword"
}
},
"item": {
"name": "scrampassword",
"password": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8="
},
"queries": [
"CREATE USER \"scrampassword\" WITH ENCRYPTED PASSWORD %(password)s "
],
"user": "scrampassword"
}
2022-06-27 15:17:42,412 p=2312675 u=ben n=ansible | TASK [Create users - again] **********************************************************************************************************************************
2022-06-27 15:17:42,431 p=2312890 u=ben n=ansible | <localhost> ESTABLISH LOCAL CONNECTION FOR USER: ben
2022-06-27 15:17:42,432 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0'
2022-06-27 15:17:42,445 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624 `" && echo ansible-tmp-1656307062.4454274-2312890-176899937664624="` echo /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624 `" ) && sleep 0'
2022-06-27 15:17:42,473 p=2312890 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_user.py
2022-06-27 15:17:42,474 p=2312890 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmpqar109yd TO /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624/AnsiballZ_postgresql_user.py
2022-06-27 15:17:42,481 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624/ /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624/AnsiballZ_postgresql_user.py && sleep 0'
2022-06-27 15:17:42,499 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-oxyxenoesdmacidmzcagfjdnbjprqmty ; PGOPTIONS='"'"'"'"'"'"'"'"'-c password_encryption=scram-sha-256'"'"'"'"'"'"'"'"' /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624/AnsiballZ_postgresql_user.py'"'"' && sleep 0'
2022-06-27 15:17:42,824 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307062.4454274-2312890-176899937664624/ > /dev/null 2>&1 && sleep 0'
2022-06-27 15:17:42,849 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0'
2022-06-27 15:17:42,850 p=2312675 u=ben n=ansible | ok: [localhost] => (item=clearpassword) => {
"ansible_loop_var": "item",
"changed": false,
"invocation": {
"module_args": {
"ca_cert": null,
"comment": null,
"conn_limit": null,
"db": "",
"encrypted": true,
"expires": null,
"fail_on_user": true,
"groups": null,
"login_host": "",
"login_password": "",
"login_unix_socket": "",
"login_user": "postgres",
"name": "clearpassword",
"no_password_changes": false,
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
"port": 5432,
"priv": null,
"role_attr_flags": "",
"session_role": null,
"ssl_mode": "prefer",
"state": "present",
"trust_input": true,
"user": "clearpassword"
}
},
"item": {
"name": "clearpassword",
"password": "swordfish"
},
"queries": [],
"user": "clearpassword"
}
2022-06-27 15:17:42,862 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798 `" && echo ansible-tmp-1656307062.8623638-2312890-122576783185798="` echo /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798 `" ) && sleep 0'
2022-06-27 15:17:42,887 p=2312890 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_user.py
2022-06-27 15:17:42,888 p=2312890 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmp6b3n39ox TO /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798/AnsiballZ_postgresql_user.py
2022-06-27 15:17:42,895 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798/ /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798/AnsiballZ_postgresql_user.py && sleep 0'
2022-06-27 15:17:42,912 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-bkehljxzcoaxdjfgucikvfgrayfdhnmn ; PGOPTIONS='"'"'"'"'"'"'"'"'-c password_encryption=scram-sha-256'"'"'"'"'"'"'"'"' /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798/AnsiballZ_postgresql_user.py'"'"' && sleep 0'
2022-06-27 15:17:43,243 p=2312890 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307062.8623638-2312890-122576783185798/ > /dev/null 2>&1 && sleep 0'
2022-06-27 15:17:43,262 p=2312675 u=ben n=ansible | changed: [localhost] => (item=scrampassword) => {
"ansible_loop_var": "item",
"changed": true,
"invocation": {
"module_args": {
"ca_cert": null,
"comment": null,
"conn_limit": null,
"db": "",
"encrypted": true,
"expires": null,
"fail_on_user": true,
"groups": null,
"login_host": "",
"login_password": "",
"login_unix_socket": "",
"login_user": "postgres",
"name": "scrampassword",
"no_password_changes": false,
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
"port": 5432,
"priv": null,
"role_attr_flags": "",
"session_role": null,
"ssl_mode": "prefer",
"state": "present",
"trust_input": true,
"user": "scrampassword"
}
},
"item": {
"name": "scrampassword",
"password": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8="
},
"queries": [],
"user": "scrampassword"
}
2022-06-27 15:17:43,273 p=2312675 u=ben n=ansible | TASK [Get password of user scrampassword] ********************************************************************************************************************
2022-06-27 15:17:43,287 p=2312930 u=ben n=ansible | <localhost> ESTABLISH LOCAL CONNECTION FOR USER: ben
2022-06-27 15:17:43,288 p=2312930 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'echo ~ben && sleep 0'
2022-06-27 15:17:43,303 p=2312930 u=ben n=ansible | <localhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /var/tmp `"&& mkdir "` echo /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014 `" && echo ansible-tmp-1656307063.302608-2312930-187391231342014="` echo /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014 `" ) && sleep 0'
2022-06-27 15:17:43,498 p=2312930 u=ben n=ansible | Using module file /home/ben/.ansible/collections/ansible_collections/community/postgresql/plugins/modules/postgresql_query.py
2022-06-27 15:17:43,499 p=2312930 u=ben n=ansible | <localhost> PUT /home/ben/.ansible/tmp/ansible-local-23126753uoes0mx/tmp4dfv01bo TO /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014/AnsiballZ_postgresql_query.py
2022-06-27 15:17:43,507 p=2312930 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'setfacl -m u:postgres:r-x /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014/ /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014/AnsiballZ_postgresql_query.py && sleep 0'
2022-06-27 15:17:43,524 p=2312930 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'sudo -H -S -n -u postgres /bin/sh -c '"'"'echo BECOME-SUCCESS-uloteekpgwepojlwslcuwklimxeihfzh ; /usr/libexec/platform-python /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014/AnsiballZ_postgresql_query.py'"'"' && sleep 0'
2022-06-27 15:17:43,837 p=2312930 u=ben n=ansible | <localhost> EXEC /bin/sh -c 'rm -f -r /var/tmp/ansible-tmp-1656307063.302608-2312930-187391231342014/ > /dev/null 2>&1 && sleep 0'
2022-06-27 15:17:43,857 p=2312675 u=ben n=ansible | ok: [localhost] => {
"changed": false,
"invocation": {
"module_args": {
"as_single_query": true,
"autocommit": false,
"ca_cert": null,
"db": "postgres",
"encoding": null,
"login_host": "",
"login_password": "",
"login_unix_socket": "",
"login_user": "postgres",
"named_args": null,
"path_to_script": null,
"port": 5432,
"positional_args": null,
"query": "SELECT rolpassword FROM pg_authid WHERE rolname='scrampassword';",
"search_path": null,
"session_role": null,
"ssl_mode": "prefer",
"trust_input": true
}
},
"query": "SELECT rolpassword FROM pg_authid WHERE rolname='scrampassword';",
"query_all_results": [
[
{
"rolpassword": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8="
}
]
],
"query_list": [
"SELECT rolpassword FROM pg_authid WHERE rolname='scrampassword';"
],
"query_result": [
{
"rolpassword": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8="
}
],
"rowcount": 1,
"statusmessage": "SELECT 1"
}
2022-06-27 15:17:43,867 p=2312675 u=ben n=ansible | TASK [Assert that given password is the same as the stored password] *****************************************************************************************
2022-06-27 15:17:43,904 p=2312675 u=ben n=ansible | ok: [localhost] => {
"changed": false,
"msg": "All assertions passed"
}
2022-06-27 15:17:43,914 p=2312675 u=ben n=ansible | TASK [Assert that users were not changed the second time] ****************************************************************************************************
2022-06-27 15:17:43,939 p=2312675 u=ben n=ansible | ok: [localhost] => (item={'user': 'clearpassword', 'changed': False, 'queries': [], 'invocation': {'module_args': {'name': 'clearpassword', 'password': 'VALUE_SPECIFIED_IN_NO_LOG_PARAMETER', 'user': 'clearpassword', 'login_user': 'postgres', 'login_password': '', 'login_host': '', 'login_unix_socket': '', 'port': 5432, 'ssl_mode': 'prefer', 'state': 'present', 'db': '', 'fail_on_user': True, 'role_attr_flags': '', 'encrypted': True, 'no_password_changes': False, 'trust_input': True, 'ca_cert': None, 'priv': None, 'expires': None, 'conn_limit': None, 'session_role': None, 'groups': None, 'comment': None}}, 'failed': False, 'item': {'name': 'clearpassword', 'password': 'swordfish'}, 'ansible_loop_var': 'item'}) => {
"ansible_loop_var": "item",
"changed": false,
"item": {
"ansible_loop_var": "item",
"changed": false,
"failed": false,
"invocation": {
"module_args": {
"ca_cert": null,
"comment": null,
"conn_limit": null,
"db": "",
"encrypted": true,
"expires": null,
"fail_on_user": true,
"groups": null,
"login_host": "",
"login_password": "",
"login_unix_socket": "",
"login_user": "postgres",
"name": "clearpassword",
"no_password_changes": false,
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
"port": 5432,
"priv": null,
"role_attr_flags": "",
"session_role": null,
"ssl_mode": "prefer",
"state": "present",
"trust_input": true,
"user": "clearpassword"
}
},
"item": {
"name": "clearpassword",
"password": "swordfish"
},
"queries": [],
"user": "clearpassword"
},
"msg": "All assertions passed"
}
2022-06-27 15:17:43,941 p=2312675 u=ben n=ansible | failed: [localhost] (item={'user': 'scrampassword', 'changed': True, 'queries': [], 'invocation': {'module_args': {'name': 'scrampassword', 'password': 'VALUE_SPECIFIED_IN_NO_LOG_PARAMETER', 'user': 'scrampassword', 'login_user': 'postgres', 'login_password': '', 'login_host': '', 'login_unix_socket': '', 'port': 5432, 'ssl_mode': 'prefer', 'state': 'present', 'db': '', 'fail_on_user': True, 'role_attr_flags': '', 'encrypted': True, 'no_password_changes': False, 'trust_input': True, 'ca_cert': None, 'priv': None, 'expires': None, 'conn_limit': None, 'session_role': None, 'groups': None, 'comment': None}}, 'failed': False, 'item': {'name': 'scrampassword', 'password': 'SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8='}, 'ansible_loop_var': 'item'}) => {
"ansible_loop_var": "item",
"assertion": "item.changed == False",
"changed": false,
"evaluated_to": false,
"item": {
"ansible_loop_var": "item",
"changed": true,
"failed": false,
"invocation": {
"module_args": {
"ca_cert": null,
"comment": null,
"conn_limit": null,
"db": "",
"encrypted": true,
"expires": null,
"fail_on_user": true,
"groups": null,
"login_host": "",
"login_password": "",
"login_unix_socket": "",
"login_user": "postgres",
"name": "scrampassword",
"no_password_changes": false,
"password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
"port": 5432,
"priv": null,
"role_attr_flags": "",
"session_role": null,
"ssl_mode": "prefer",
"state": "present",
"trust_input": true,
"user": "scrampassword"
}
},
"item": {
"name": "scrampassword",
"password": "SCRAM-SHA-256$4096:XkAEs3QAEZNaIZ49QgluOw==$P62LBGrtmFn7FuWxNJKt3ZlfuteVVV2AZmETo5EkFEI=:dJyvi8FA4emhPhsH/ND7AxSxIc2URCiGUspmdV5MGW8="
},
"queries": [],
"user": "scrampassword"
},
"msg": "Assertion failed"
}
2022-06-27 15:17:43,943 p=2312675 u=ben n=ansible | ...ignoring
2022-06-27 15:17:43,952 p=2312675 u=ben n=ansible | META: ran handlers
2022-06-27 15:17:43,960 p=2312675 u=ben n=ansible | META: ran handlers
2022-06-27 15:17:43,962 p=2312675 u=ben n=ansible | PLAY RECAP ***************************************************************************************************************************************************
2022-06-27 15:17:43,962 p=2312675 u=ben n=ansible | localhost : ok=7 changed=3 unreachable=0 failed=0 skipped=0 rescued=0 ignored=1
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment