ansible-playbook [core 2.17.8]
  config file = None
  configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules']
  ansible python module location = /usr/local/lib/python3.12/site-packages/ansible
  ansible collection location = /tmp/collections-F6G
  executable location = /usr/local/bin/ansible-playbook
  python version = 3.12.8 (main, Dec  6 2024, 00:00:00) [GCC 14.2.1 20240912 (Red Hat 14.2.1-3)] (/usr/bin/python3.12)
  jinja version = 3.1.5
  libyaml = True
No config file found; using defaults
running playbook inside collection fedora.linux_system_roles
redirecting (type: callback) ansible.builtin.debug to ansible.posix.debug
redirecting (type: callback) ansible.builtin.debug to ansible.posix.debug
redirecting (type: callback) ansible.builtin.profile_tasks to ansible.posix.profile_tasks
Skipping callback 'default', as we already have a stdout callback.
Skipping callback 'minimal', as we already have a stdout callback.
Skipping callback 'oneline', as we already have a stdout callback.

PLAYBOOK: tests_reboot.yml *****************************************************
1 plays in /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml

PLAY [Ensure we can set crypto policy including reboot of the system] **********

TASK [Gathering Facts] *********************************************************
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml:3
Friday 07 February 2025  23:25:17 -0500 (0:00:00.011)       0:00:00.011 ******* 
[WARNING]: Platform linux on host managed-node1 is using the discovered Python
interpreter at /usr/bin/python3.12, but future installation of another Python
interpreter could change the meaning of that path. See
https://docs.ansible.com/ansible-
core/2.17/reference_appendices/interpreter_discovery.html for more information.
ok: [managed-node1]

TASK [Ensure we can set crypto policy including reboot of the system] **********
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml:11
Friday 07 February 2025  23:25:19 -0500 (0:00:01.245)       0:00:01.257 ******* 
included: fedora.linux_system_roles.crypto_policies for managed-node1

TASK [fedora.linux_system_roles.crypto_policies : Set platform/version specific variables] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:3
Friday 07 February 2025  23:25:19 -0500 (0:00:00.064)       0:00:01.322 ******* 
included: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml for managed-node1

TASK [fedora.linux_system_roles.crypto_policies : Ensure ansible_facts used by role] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:2
Friday 07 February 2025  23:25:19 -0500 (0:00:00.036)       0:00:01.358 ******* 
skipping: [managed-node1] => {
    "changed": false,
    "false_condition": "__crypto_policies_required_facts | difference(ansible_facts.keys() | list) | length > 0",
    "skip_reason": "Conditional result was False"
}

TASK [fedora.linux_system_roles.crypto_policies : Check if system is ostree] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:10
Friday 07 February 2025  23:25:19 -0500 (0:00:00.057)       0:00:01.416 ******* 
ok: [managed-node1] => {
    "changed": false,
    "stat": {
        "exists": false
    }
}

TASK [fedora.linux_system_roles.crypto_policies : Set flag to indicate system is ostree] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:15
Friday 07 February 2025  23:25:19 -0500 (0:00:00.602)       0:00:02.019 ******* 
ok: [managed-node1] => {
    "ansible_facts": {
        "__crypto_policies_is_ostree": false
    },
    "changed": false
}

TASK [fedora.linux_system_roles.crypto_policies : Check if transactional-update exists in /sbin] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:22
Friday 07 February 2025  23:25:19 -0500 (0:00:00.035)       0:00:02.055 ******* 
ok: [managed-node1] => {
    "changed": false,
    "stat": {
        "exists": false
    }
}

TASK [fedora.linux_system_roles.crypto_policies : Set flag if transactional-update exists] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:27
Friday 07 February 2025  23:25:20 -0500 (0:00:00.426)       0:00:02.482 ******* 
ok: [managed-node1] => {
    "ansible_facts": {
        "__crypto_policies_is_transactional": false
    },
    "changed": false
}

TASK [fedora.linux_system_roles.crypto_policies : Set platform/version specific variables] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:31
Friday 07 February 2025  23:25:20 -0500 (0:00:00.047)       0:00:02.529 ******* 
skipping: [managed-node1] => (item=RedHat.yml)  => {
    "ansible_loop_var": "item",
    "changed": false,
    "false_condition": "__vars_file is file",
    "item": "RedHat.yml",
    "skip_reason": "Conditional result was False"
}
skipping: [managed-node1] => (item=Fedora.yml)  => {
    "ansible_loop_var": "item",
    "changed": false,
    "false_condition": "__vars_file is file",
    "item": "Fedora.yml",
    "skip_reason": "Conditional result was False"
}
skipping: [managed-node1] => (item=Fedora_40.yml)  => {
    "ansible_loop_var": "item",
    "changed": false,
    "false_condition": "__vars_file is file",
    "item": "Fedora_40.yml",
    "skip_reason": "Conditional result was False"
}
skipping: [managed-node1] => (item=Fedora_40.yml)  => {
    "ansible_loop_var": "item",
    "changed": false,
    "false_condition": "__vars_file is file",
    "item": "Fedora_40.yml",
    "skip_reason": "Conditional result was False"
}
skipping: [managed-node1] => {
    "changed": false
}

MSG:

All items skipped

TASK [fedora.linux_system_roles.crypto_policies : Ensure required packages are installed] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:6
Friday 07 February 2025  23:25:20 -0500 (0:00:00.060)       0:00:02.589 ******* 
ok: [managed-node1] => {
    "changed": false,
    "rc": 0,
    "results": []
}

MSG:

Nothing to do
lsrpackages: crypto-policies crypto-policies-scripts

TASK [fedora.linux_system_roles.crypto_policies : Notify user that reboot is needed to apply changes] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:18
Friday 07 February 2025  23:25:22 -0500 (0:00:01.667)       0:00:04.256 ******* 
skipping: [managed-node1] => {
    "false_condition": "__crypto_policies_is_transactional | d(false)"
}

TASK [fedora.linux_system_roles.crypto_policies : Reboot transactional update systems] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:23
Friday 07 February 2025  23:25:22 -0500 (0:00:00.055)       0:00:04.312 ******* 
skipping: [managed-node1] => {
    "changed": false,
    "false_condition": "__crypto_policies_is_transactional | d(false)",
    "skip_reason": "Conditional result was False"
}

TASK [fedora.linux_system_roles.crypto_policies : Fail if reboot is needed and not set] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:28
Friday 07 February 2025  23:25:22 -0500 (0:00:00.054)       0:00:04.366 ******* 
skipping: [managed-node1] => {
    "changed": false,
    "false_condition": "__crypto_policies_is_transactional | d(false)",
    "skip_reason": "Conditional result was False"
}

TASK [fedora.linux_system_roles.crypto_policies : Gather facts] ****************
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:36
Friday 07 February 2025  23:25:22 -0500 (0:00:00.056)       0:00:04.422 ******* 
included: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml for managed-node1

TASK [fedora.linux_system_roles.crypto_policies : Find out what is the currently active policy] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml:3
Friday 07 February 2025  23:25:22 -0500 (0:00:00.019)       0:00:04.442 ******* 
ok: [managed-node1] => {
    "changed": false,
    "cmd": [
        "update-crypto-policies",
        "--show"
    ],
    "delta": "0:00:00.063130",
    "end": "2025-02-07 23:25:22.694487",
    "rc": 0,
    "start": "2025-02-07 23:25:22.631357"
}

STDOUT:

DEFAULT

TASK [fedora.linux_system_roles.crypto_policies : Set current policy fact] *****
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml:9
Friday 07 February 2025  23:25:22 -0500 (0:00:00.538)       0:00:04.980 ******* 
ok: [managed-node1] => {
    "ansible_facts": {
        "crypto_policies_active": "DEFAULT"
    },
    "changed": false
}

TASK [fedora.linux_system_roles.crypto_policies : Find base policies files] ****
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:39
Friday 07 February 2025  23:25:22 -0500 (0:00:00.018)       0:00:04.999 ******* 
ok: [managed-node1] => {
    "changed": false,
    "examined": 13,
    "files": [
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147855,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/TEST-FEDORA41.pol",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 2983,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147853,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/NEXT.pol",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 3415,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147854,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/TEST-FEDORA39.pol",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 2844,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147851,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/GOST-ONLY.pol",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 936,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147852,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/LEGACY.pol",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 3492,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147845,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/BSI.pol",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 4233,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147848,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/FEDORA38.pol",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 3415,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147849,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/FIPS.pol",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 2420,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147847,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/EMPTY.pol",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 277,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1738679862.737,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147846,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/DEFAULT.pol",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 3415,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147850,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/FUTURE.pol",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 2955,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        }
    ],
    "matched": 11,
    "skipped_paths": {}
}

MSG:

All paths examined

TASK [fedora.linux_system_roles.crypto_policies : Set available base policies fact] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:47
Friday 07 February 2025  23:25:23 -0500 (0:00:00.490)       0:00:05.490 ******* 
ok: [managed-node1] => {
    "ansible_facts": {
        "crypto_policies_available_policies": [
            "TEST-FEDORA41",
            "NEXT",
            "TEST-FEDORA39",
            "GOST-ONLY",
            "LEGACY",
            "BSI",
            "FEDORA38",
            "FIPS",
            "EMPTY",
            "DEFAULT",
            "FUTURE"
        ]
    },
    "changed": false
}

TASK [fedora.linux_system_roles.crypto_policies : Find subpolicy files] ********
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:54
Friday 07 February 2025  23:25:23 -0500 (0:00:00.055)       0:00:05.545 ******* 
ok: [managed-node1] => {
    "changed": false,
    "examined": 10,
    "files": [
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147860,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/modules/GOST.pmod",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 789,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147866,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/modules/TEST-PQ.pmod",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 1612,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147865,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/modules/SHA1.pmod",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 131,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147863,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/modules/NO-SHA1.pmod",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 288,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147858,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/modules/ECDHE-ONLY.pmod",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 136,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147861,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/modules/NO-CAMELLIA.pmod",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 93,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147857,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/modules/AD-SUPPORT.pmod",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 331,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147862,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/modules/NO-ENFORCE-EMS.pmod",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 248,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147864,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/modules/OSPP.pmod",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 2014,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        },
        {
            "atime": 1728580069.0,
            "ctime": 1738679804.783,
            "dev": 51714,
            "gid": 0,
            "gr_name": "root",
            "inode": 147859,
            "isblk": false,
            "ischr": false,
            "isdir": false,
            "isfifo": false,
            "isgid": false,
            "islnk": false,
            "isreg": true,
            "issock": false,
            "isuid": false,
            "mode": "0644",
            "mtime": 1728580069.0,
            "nlink": 1,
            "path": "/usr/share/crypto-policies/policies/modules/FEDORA32.pmod",
            "pw_name": "root",
            "rgrp": true,
            "roth": true,
            "rusr": true,
            "size": 398,
            "uid": 0,
            "wgrp": false,
            "woth": false,
            "wusr": true,
            "xgrp": false,
            "xoth": false,
            "xusr": false
        }
    ],
    "matched": 10,
    "skipped_paths": {}
}

MSG:

All paths examined

TASK [fedora.linux_system_roles.crypto_policies : Set available subpolicies fact] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:62
Friday 07 February 2025  23:25:23 -0500 (0:00:00.422)       0:00:05.968 ******* 
ok: [managed-node1] => {
    "ansible_facts": {
        "crypto_policies_available_subpolicies": [
            "GOST",
            "TEST-PQ",
            "SHA1",
            "NO-SHA1",
            "ECDHE-ONLY",
            "NO-CAMELLIA",
            "AD-SUPPORT",
            "NO-ENFORCE-EMS",
            "OSPP",
            "FEDORA32"
        ]
    },
    "changed": false
}

TASK [fedora.linux_system_roles.crypto_policies : Set crypto_policies_available_modules fact (deprecated)] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:69
Friday 07 February 2025  23:25:23 -0500 (0:00:00.051)       0:00:06.020 ******* 
ok: [managed-node1] => {
    "ansible_facts": {
        "crypto_policies_available_modules": [
            "GOST",
            "TEST-PQ",
            "SHA1",
            "NO-SHA1",
            "ECDHE-ONLY",
            "NO-CAMELLIA",
            "AD-SUPPORT",
            "NO-ENFORCE-EMS",
            "OSPP",
            "FEDORA32"
        ]
    },
    "changed": false
}

TASK [fedora.linux_system_roles.crypto_policies : Update crypto policy if needed] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:75
Friday 07 February 2025  23:25:23 -0500 (0:00:00.021)       0:00:06.041 ******* 
Notification for handler __crypto_policies_handler_modified has been saved.
changed: [managed-node1] => {
    "changed": true,
    "cmd": [
        "update-crypto-policies",
        "--set",
        "FUTURE"
    ],
    "delta": "0:00:00.229990",
    "end": "2025-02-07 23:25:24.382702",
    "rc": 0,
    "start": "2025-02-07 23:25:24.152712"
}

STDOUT:

Setting system policy to FUTURE
Note: System-wide crypto policies are applied on application start-up.
It is recommended to restart the system for the change of policies
to fully take place.

TASK [fedora.linux_system_roles.crypto_policies : Set the reboot_required flag if needed] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:87
Friday 07 February 2025  23:25:24 -0500 (0:00:00.629)       0:00:06.671 ******* 
ok: [managed-node1] => {
    "ansible_facts": {
        "crypto_policies_reboot_required": true
    },
    "changed": false
}

TASK [fedora.linux_system_roles.crypto_policies : Update facts after applying policy] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:95
Friday 07 February 2025  23:25:24 -0500 (0:00:00.046)       0:00:06.718 ******* 
included: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml for managed-node1

TASK [fedora.linux_system_roles.crypto_policies : Find out what is the currently active policy] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml:3
Friday 07 February 2025  23:25:24 -0500 (0:00:00.020)       0:00:06.738 ******* 
ok: [managed-node1] => {
    "changed": false,
    "cmd": [
        "update-crypto-policies",
        "--show"
    ],
    "delta": "0:00:00.064110",
    "end": "2025-02-07 23:25:24.892998",
    "rc": 0,
    "start": "2025-02-07 23:25:24.828888"
}

STDOUT:

FUTURE

TASK [fedora.linux_system_roles.crypto_policies : Set current policy fact] *****
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml:9
Friday 07 February 2025  23:25:24 -0500 (0:00:00.441)       0:00:07.180 ******* 
ok: [managed-node1] => {
    "ansible_facts": {
        "crypto_policies_active": "FUTURE"
    },
    "changed": false
}

TASK [Flush handlers] **********************************************************
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml:19
Friday 07 February 2025  23:25:24 -0500 (0:00:00.021)       0:00:07.201 ******* 
NOTIFIED HANDLER fedora.linux_system_roles.crypto_policies : Reboot the managed host to apply crypto policies changes for managed-node1
NOTIFIED HANDLER fedora.linux_system_roles.crypto_policies : Clear the crypto_policies_reboot_required flag for managed-node1
META: triggered running handlers for managed-node1

RUNNING HANDLER [fedora.linux_system_roles.crypto_policies : Reboot the managed host to apply crypto policies changes] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/handlers/main.yml:4
Friday 07 February 2025  23:25:24 -0500 (0:00:00.002)       0:00:07.204 ******* 
fatal: [managed-node1]: FAILED! => {}

MSG:

Failed to connect to the host via ssh: OpenSSH_9.6p1, OpenSSL 3.2.2 4 Jun 2024
debug1: Reading configuration data /root/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf
debug2: checking match for 'final all' host 10.31.15.45 originally 10.31.15.45
debug2: match not found
debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
debug1: configuration requests final Match pass
debug2: resolve_canonicalize: hostname 10.31.15.45 is address
debug1: re-parsing configuration
debug1: Reading configuration data /root/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf
debug2: checking match for 'final all' host 10.31.15.45 originally 10.31.15.45
debug2: match found
debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
debug1: auto-mux: Trying existing master at '/root/.ansible/cp/9dad093f89'
debug1: Control socket "/root/.ansible/cp/9dad093f89" does not exist
debug1: Connecting to 10.31.15.45 [10.31.15.45] port 22.
debug2: fd 3 setting O_NONBLOCK
debug1: fd 3 clearing O_NONBLOCK
debug1: Connection established.
debug1: identity file /root/.ssh/id_rsa type -1
debug1: identity file /root/.ssh/id_rsa-cert type -1
debug1: identity file /root/.ssh/id_ecdsa type -1
debug1: identity file /root/.ssh/id_ecdsa-cert type -1
debug1: identity file /root/.ssh/id_ecdsa_sk type -1
debug1: identity file /root/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /root/.ssh/id_ed25519 type -1
debug1: identity file /root/.ssh/id_ed25519-cert type -1
debug1: identity file /root/.ssh/id_ed25519_sk type -1
debug1: identity file /root/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /root/.ssh/id_xmss type -1
debug1: identity file /root/.ssh/id_xmss-cert type -1
debug1: identity file /root/.ssh/id_dsa type -1
debug1: identity file /root/.ssh/id_dsa-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_9.6
debug1: Remote protocol version 2.0, remote software version OpenSSH_9.6
debug1: compat_banner: match: OpenSSH_9.6 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to 10.31.15.45:22 as 'root'
debug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-c,kex-strict-c-v00@openssh.com
debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256
debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr
debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr
debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512
debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512
debug2: compression ctos: zlib@openssh.com,zlib,none
debug2: compression stoc: zlib@openssh.com,zlib,none
debug2: languages ctos: 
debug2: languages stoc: 
debug2: first_kex_follows 0 
debug2: reserved 0 
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-s,kex-strict-s-v00@openssh.com
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr
debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr
debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,umac-128@openssh.com,hmac-sha2-512
debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,umac-128@openssh.com,hmac-sha2-512
debug2: compression ctos: none,zlib@openssh.com
debug2: compression stoc: none,zlib@openssh.com
debug2: languages ctos: 
debug2: languages stoc: 
debug2: first_kex_follows 0 
debug2: reserved 0 
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ssh-ed25519
debug1: kex: server->client cipher: aes256-gcm@openssh.com MAC: <implicit> compression: zlib@openssh.com
debug1: kex: client->server cipher: aes256-gcm@openssh.com MAC: <implicit> compression: zlib@openssh.com
debug1: kex: curve25519-sha256 need=32 dh_need=32
debug1: kex: curve25519-sha256 need=32 dh_need=32
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: SSH2_MSG_KEX_ECDH_REPLY received
debug1: Server host key: ssh-ed25519 SHA256:PNc8HPfTUoy8EaCxKaMriPHRF1X6C6R3mRjgxMpjb6I
debug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
debug1: Host '10.31.15.45' is known and matches the ED25519 host key.
debug1: Found key in /root/.ssh/known_hosts:1
debug1: ssh_packet_send2_wrapped: resetting send seqnr 3
debug2: ssh_set_newkeys: mode 1
debug1: rekey out after 4294967296 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: Sending SSH2_MSG_EXT_INFO
debug1: expecting SSH2_MSG_NEWKEYS
debug1: ssh_packet_read_poll2: resetting read seqnr 3
debug1: SSH2_MSG_NEWKEYS received
debug2: ssh_set_newkeys: mode 0
debug1: rekey in after 4294967296 blocks
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_ext_info_client_parse: server-sig-algs=<ecdsa-sha2-nistp256,sk-ecdsa-sha2-nistp256@openssh.com,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,sk-ssh-ed25519@openssh.com,rsa-sha2-256,rsa-sha2-512>
debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0>
debug1: kex_ext_info_check_ver: ping@openssh.com=<0>
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_ext_info_client_parse: server-sig-algs=<ecdsa-sha2-nistp256,sk-ecdsa-sha2-nistp256@openssh.com,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,sk-ssh-ed25519@openssh.com,rsa-sha2-256,rsa-sha2-512>
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug1: Next authentication method: gssapi-with-mic
debug1: No credentials were supplied, or the credentials were unavailable or inaccessible
No Kerberos credentials available (default cache: KCM:)


debug1: No credentials were supplied, or the credentials were unavailable or inaccessible
No Kerberos credentials available (default cache: KCM:)


debug2: we did not send a packet, disable method
debug1: Next authentication method: publickey
debug1: Will attempt key: /root/.ssh/id_rsa 
debug1: Will attempt key: /root/.ssh/id_ecdsa 
debug1: Will attempt key: /root/.ssh/id_ecdsa_sk 
debug1: Will attempt key: /root/.ssh/id_ed25519 
debug1: Will attempt key: /root/.ssh/id_ed25519_sk 
debug1: Will attempt key: /root/.ssh/id_xmss 
debug1: Will attempt key: /root/.ssh/id_dsa 
debug2: pubkey_prepare: done
debug1: Trying private key: /root/.ssh/id_rsa
debug2: we sent a publickey packet, wait for reply
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug1: Trying private key: /root/.ssh/id_ecdsa
debug1: Trying private key: /root/.ssh/id_ecdsa_sk
debug1: Trying private key: /root/.ssh/id_ed25519
debug1: Trying private key: /root/.ssh/id_ed25519_sk
debug1: Trying private key: /root/.ssh/id_xmss
debug1: Trying private key: /root/.ssh/id_dsa
debug2: we did not send a packet, disable method
debug1: No more authentication methods to try.
root@10.31.15.45: Permission denied (publickey,gssapi-keyex,gssapi-with-mic,password).

TASK [Restore policy to DEFAULT] ***********************************************
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml:29
Friday 07 February 2025  23:35:28 -0500 (0:10:03.625)       0:10:10.829 ******* 
included: fedora.linux_system_roles.crypto_policies for managed-node1

TASK [fedora.linux_system_roles.crypto_policies : Set platform/version specific variables] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:3
Friday 07 February 2025  23:35:28 -0500 (0:00:00.043)       0:10:10.873 ******* 
included: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml for managed-node1

TASK [fedora.linux_system_roles.crypto_policies : Ensure ansible_facts used by role] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:2
Friday 07 February 2025  23:35:28 -0500 (0:00:00.022)       0:10:10.895 ******* 
skipping: [managed-node1] => {
    "changed": false,
    "false_condition": "__crypto_policies_required_facts | difference(ansible_facts.keys() | list) | length > 0",
    "skip_reason": "Conditional result was False"
}

TASK [fedora.linux_system_roles.crypto_policies : Check if system is ostree] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:10
Friday 07 February 2025  23:35:28 -0500 (0:00:00.034)       0:10:10.930 ******* 
skipping: [managed-node1] => {
    "changed": false,
    "false_condition": "not __crypto_policies_is_ostree is defined",
    "skip_reason": "Conditional result was False"
}

TASK [fedora.linux_system_roles.crypto_policies : Set flag to indicate system is ostree] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:15
Friday 07 February 2025  23:35:28 -0500 (0:00:00.019)       0:10:10.949 ******* 
skipping: [managed-node1] => {
    "changed": false,
    "false_condition": "not __crypto_policies_is_ostree is defined",
    "skip_reason": "Conditional result was False"
}

TASK [fedora.linux_system_roles.crypto_policies : Check if transactional-update exists in /sbin] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:22
Friday 07 February 2025  23:35:28 -0500 (0:00:00.018)       0:10:10.968 ******* 
skipping: [managed-node1] => {
    "changed": false,
    "false_condition": "not __crypto_policies_is_transactional is defined",
    "skip_reason": "Conditional result was False"
}

TASK [fedora.linux_system_roles.crypto_policies : Set flag if transactional-update exists] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:27
Friday 07 February 2025  23:35:28 -0500 (0:00:00.018)       0:10:10.986 ******* 
skipping: [managed-node1] => {
    "changed": false,
    "false_condition": "not __crypto_policies_is_transactional is defined",
    "skip_reason": "Conditional result was False"
}

TASK [fedora.linux_system_roles.crypto_policies : Set platform/version specific variables] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:31
Friday 07 February 2025  23:35:28 -0500 (0:00:00.019)       0:10:11.005 ******* 
skipping: [managed-node1] => (item=RedHat.yml)  => {
    "ansible_loop_var": "item",
    "changed": false,
    "false_condition": "__vars_file is file",
    "item": "RedHat.yml",
    "skip_reason": "Conditional result was False"
}
skipping: [managed-node1] => (item=Fedora.yml)  => {
    "ansible_loop_var": "item",
    "changed": false,
    "false_condition": "__vars_file is file",
    "item": "Fedora.yml",
    "skip_reason": "Conditional result was False"
}
skipping: [managed-node1] => (item=Fedora_40.yml)  => {
    "ansible_loop_var": "item",
    "changed": false,
    "false_condition": "__vars_file is file",
    "item": "Fedora_40.yml",
    "skip_reason": "Conditional result was False"
}
skipping: [managed-node1] => (item=Fedora_40.yml)  => {
    "ansible_loop_var": "item",
    "changed": false,
    "false_condition": "__vars_file is file",
    "item": "Fedora_40.yml",
    "skip_reason": "Conditional result was False"
}
skipping: [managed-node1] => {
    "changed": false
}

MSG:

All items skipped

TASK [fedora.linux_system_roles.crypto_policies : Ensure required packages are installed] ***
task path: /tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:6
Friday 07 February 2025  23:35:28 -0500 (0:00:00.032)       0:10:11.038 ******* 
fatal: [managed-node1]: UNREACHABLE! => {
    "changed": false,
    "unreachable": true
}

MSG:

Failed to connect to the host via ssh: OpenSSH_9.6p1, OpenSSL 3.2.2 4 Jun 2024
debug1: Reading configuration data /root/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf
debug2: checking match for 'final all' host 10.31.15.45 originally 10.31.15.45
debug2: match not found
debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
debug1: configuration requests final Match pass
debug2: resolve_canonicalize: hostname 10.31.15.45 is address
debug1: re-parsing configuration
debug1: Reading configuration data /root/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf
debug2: checking match for 'final all' host 10.31.15.45 originally 10.31.15.45
debug2: match found
debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
debug1: auto-mux: Trying existing master at '/root/.ansible/cp/9dad093f89'
debug1: Control socket "/root/.ansible/cp/9dad093f89" does not exist
debug1: Connecting to 10.31.15.45 [10.31.15.45] port 22.
debug2: fd 3 setting O_NONBLOCK
debug1: fd 3 clearing O_NONBLOCK
debug1: Connection established.
debug1: identity file /root/.ssh/id_rsa type -1
debug1: identity file /root/.ssh/id_rsa-cert type -1
debug1: identity file /root/.ssh/id_ecdsa type -1
debug1: identity file /root/.ssh/id_ecdsa-cert type -1
debug1: identity file /root/.ssh/id_ecdsa_sk type -1
debug1: identity file /root/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /root/.ssh/id_ed25519 type -1
debug1: identity file /root/.ssh/id_ed25519-cert type -1
debug1: identity file /root/.ssh/id_ed25519_sk type -1
debug1: identity file /root/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /root/.ssh/id_xmss type -1
debug1: identity file /root/.ssh/id_xmss-cert type -1
debug1: identity file /root/.ssh/id_dsa type -1
debug1: identity file /root/.ssh/id_dsa-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_9.6
debug1: Remote protocol version 2.0, remote software version OpenSSH_9.6
debug1: compat_banner: match: OpenSSH_9.6 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to 10.31.15.45:22 as 'root'
debug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-c,kex-strict-c-v00@openssh.com
debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256
debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr
debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr
debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512
debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512
debug2: compression ctos: zlib@openssh.com,zlib,none
debug2: compression stoc: zlib@openssh.com,zlib,none
debug2: languages ctos: 
debug2: languages stoc: 
debug2: first_kex_follows 0 
debug2: reserved 0 
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-s,kex-strict-s-v00@openssh.com
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr
debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr
debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,umac-128@openssh.com,hmac-sha2-512
debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,umac-128@openssh.com,hmac-sha2-512
debug2: compression ctos: none,zlib@openssh.com
debug2: compression stoc: none,zlib@openssh.com
debug2: languages ctos: 
debug2: languages stoc: 
debug2: first_kex_follows 0 
debug2: reserved 0 
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ssh-ed25519
debug1: kex: server->client cipher: aes256-gcm@openssh.com MAC: <implicit> compression: zlib@openssh.com
debug1: kex: client->server cipher: aes256-gcm@openssh.com MAC: <implicit> compression: zlib@openssh.com
debug1: kex: curve25519-sha256 need=32 dh_need=32
debug1: kex: curve25519-sha256 need=32 dh_need=32
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: SSH2_MSG_KEX_ECDH_REPLY received
debug1: Server host key: ssh-ed25519 SHA256:PNc8HPfTUoy8EaCxKaMriPHRF1X6C6R3mRjgxMpjb6I
debug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
debug1: Host '10.31.15.45' is known and matches the ED25519 host key.
debug1: Found key in /root/.ssh/known_hosts:1
debug1: ssh_packet_send2_wrapped: resetting send seqnr 3
debug2: ssh_set_newkeys: mode 1
debug1: rekey out after 4294967296 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: Sending SSH2_MSG_EXT_INFO
debug1: expecting SSH2_MSG_NEWKEYS
debug1: ssh_packet_read_poll2: resetting read seqnr 3
debug1: SSH2_MSG_NEWKEYS received
debug2: ssh_set_newkeys: mode 0
debug1: rekey in after 4294967296 blocks
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_ext_info_client_parse: server-sig-algs=<ecdsa-sha2-nistp256,sk-ecdsa-sha2-nistp256@openssh.com,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,sk-ssh-ed25519@openssh.com,rsa-sha2-256,rsa-sha2-512>
debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0>
debug1: kex_ext_info_check_ver: ping@openssh.com=<0>
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_ext_info_client_parse: server-sig-algs=<ecdsa-sha2-nistp256,sk-ecdsa-sha2-nistp256@openssh.com,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,sk-ssh-ed25519@openssh.com,rsa-sha2-256,rsa-sha2-512>
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug1: Next authentication method: gssapi-with-mic
debug1: No credentials were supplied, or the credentials were unavailable or inaccessible
No Kerberos credentials available (default cache: KCM:)


debug1: No credentials were supplied, or the credentials were unavailable or inaccessible
No Kerberos credentials available (default cache: KCM:)


debug2: we did not send a packet, disable method
debug1: Next authentication method: publickey
debug1: Will attempt key: /root/.ssh/id_rsa 
debug1: Will attempt key: /root/.ssh/id_ecdsa 
debug1: Will attempt key: /root/.ssh/id_ecdsa_sk 
debug1: Will attempt key: /root/.ssh/id_ed25519 
debug1: Will attempt key: /root/.ssh/id_ed25519_sk 
debug1: Will attempt key: /root/.ssh/id_xmss 
debug1: Will attempt key: /root/.ssh/id_dsa 
debug2: pubkey_prepare: done
debug1: Trying private key: /root/.ssh/id_rsa
debug2: we sent a publickey packet, wait for reply
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug1: Trying private key: /root/.ssh/id_ecdsa
debug1: Trying private key: /root/.ssh/id_ecdsa_sk
debug1: Trying private key: /root/.ssh/id_ed25519
debug1: Trying private key: /root/.ssh/id_ed25519_sk
debug1: Trying private key: /root/.ssh/id_xmss
debug1: Trying private key: /root/.ssh/id_dsa
debug2: we did not send a packet, disable method
debug1: No more authentication methods to try.
root@10.31.15.45: Permission denied (publickey,gssapi-keyex,gssapi-with-mic,password).

PLAY RECAP *********************************************************************
managed-node1              : ok=23   changed=1    unreachable=1    failed=1    skipped=11   rescued=0    ignored=0   


TASKS RECAP ********************************************************************
Friday 07 February 2025  23:35:28 -0500 (0:00:00.120)       0:10:11.159 ******* 
=============================================================================== 
fedora.linux_system_roles.crypto_policies : Reboot the managed host to apply crypto policies changes - 603.63s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/handlers/main.yml:4 
fedora.linux_system_roles.crypto_policies : Ensure required packages are installed --- 1.67s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:6 
Gathering Facts --------------------------------------------------------- 1.25s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml:3 
fedora.linux_system_roles.crypto_policies : Update crypto policy if needed --- 0.63s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:75 
fedora.linux_system_roles.crypto_policies : Check if system is ostree --- 0.60s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:10 
fedora.linux_system_roles.crypto_policies : Find out what is the currently active policy --- 0.54s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml:3 
fedora.linux_system_roles.crypto_policies : Find base policies files ---- 0.49s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:39 
fedora.linux_system_roles.crypto_policies : Find out what is the currently active policy --- 0.44s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml:3 
fedora.linux_system_roles.crypto_policies : Check if transactional-update exists in /sbin --- 0.43s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:22 
fedora.linux_system_roles.crypto_policies : Find subpolicy files -------- 0.42s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:54 
fedora.linux_system_roles.crypto_policies : Ensure required packages are installed --- 0.12s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:6 
Ensure we can set crypto policy including reboot of the system ---------- 0.06s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml:11 
fedora.linux_system_roles.crypto_policies : Set platform/version specific variables --- 0.06s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:31 
fedora.linux_system_roles.crypto_policies : Ensure ansible_facts used by role --- 0.06s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:2 
fedora.linux_system_roles.crypto_policies : Fail if reboot is needed and not set --- 0.06s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:28 
fedora.linux_system_roles.crypto_policies : Notify user that reboot is needed to apply changes --- 0.06s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:18 
fedora.linux_system_roles.crypto_policies : Set available base policies fact --- 0.06s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:47 
fedora.linux_system_roles.crypto_policies : Reboot transactional update systems --- 0.05s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:23 
fedora.linux_system_roles.crypto_policies : Set available subpolicies fact --- 0.05s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:62 
fedora.linux_system_roles.crypto_policies : Set flag if transactional-update exists --- 0.05s
/tmp/collections-F6G/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:27