ansible-playbook [core 2.17.14] config file = None configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/local/lib/python3.12/site-packages/ansible ansible collection location = /tmp/collections-gHi executable location = /usr/local/bin/ansible-playbook python version = 3.12.12 (main, Nov 14 2025, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-14)] (/usr/bin/python3.12) jinja version = 3.1.6 libyaml = True No config file found; using defaults running playbook inside collection fedora.linux_system_roles Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_default.yml **************************************************** 1 plays in /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/tests/pam_pwd/tests_default.yml PLAY [Ensure that the role runs with default parameters] *********************** TASK [Gathering Facts] ********************************************************* task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/tests/pam_pwd/tests_default.yml:3 Wednesday 07 January 2026 15:58:24 -0500 (0:00:00.018) 0:00:00.018 ***** [WARNING]: Platform linux on host managed-node1 is using the discovered Python interpreter at /usr/bin/python3.9, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.17/reference_appendices/interpreter_discovery.html for more information. ok: [managed-node1] TASK [fedora.linux_system_roles.pam_pwd : Perform platform/version specific tasks] *** task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/main.yml:4 Wednesday 07 January 2026 15:58:25 -0500 (0:00:01.025) 0:00:01.043 ***** included: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml for managed-node1 TASK [fedora.linux_system_roles.pam_pwd : Deny access after number of consecutive authentication failures num 5] *** task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:2 Wednesday 07 January 2026 15:58:25 -0500 (0:00:00.036) 0:00:01.080 ***** ok: [managed-node1] => { "backup": "", "changed": false } TASK [fedora.linux_system_roles.pam_pwd : Re-enable access after the lock out seconds 300] *** task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:12 Wednesday 07 January 2026 15:58:25 -0500 (0:00:00.460) 0:00:01.540 ***** ok: [managed-node1] => { "backup": "", "changed": false } TASK [fedora.linux_system_roles.pam_pwd : Set option silent in /etc/security/faillock.conf] *** task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:20 Wednesday 07 January 2026 15:58:26 -0500 (0:00:00.343) 0:00:01.884 ***** ok: [managed-node1] => { "backup": "", "changed": false } TASK [fedora.linux_system_roles.pam_pwd : Ensure authselect is installed] ****** task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:27 Wednesday 07 January 2026 15:58:26 -0500 (0:00:00.333) 0:00:02.217 ***** ok: [managed-node1] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do TASK [fedora.linux_system_roles.pam_pwd : List authselect profiles] ************ task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:34 Wednesday 07 January 2026 15:58:27 -0500 (0:00:01.040) 0:00:03.258 ***** ok: [managed-node1] => { "changed": false, "cmd": [ "authselect", "list" ], "delta": "0:00:00.003989", "end": "2026-01-07 15:58:27.943827", "rc": 0, "start": "2026-01-07 15:58:27.939838" } STDOUT: - minimal Local users only for minimal installations - sssd Enable SSSD for system authentication (also for local users only) - winbind Enable winbind for system authentication - custom/password-policy Enable SSSD for system authentication (also for local users only) TASK [fedora.linux_system_roles.pam_pwd : Create custom authselect profile from existing profile sssd password-policy] *** task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:43 Wednesday 07 January 2026 15:58:27 -0500 (0:00:00.429) 0:00:03.687 ***** skipping: [managed-node1] => { "changed": false, "false_condition": "not pam_pwd_policy_name in __pam_pwd_authselect_list.stdout", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.pam_pwd : List authselect current profile] ***** task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:51 Wednesday 07 January 2026 15:58:28 -0500 (0:00:00.012) 0:00:03.700 ***** ok: [managed-node1] => { "changed": false, "cmd": [ "authselect", "current" ], "delta": "0:00:00.003279", "end": "2026-01-07 15:58:28.290316", "failed_when_result": false, "rc": 0, "start": "2026-01-07 15:58:28.287037" } STDOUT: Profile ID: custom/password-policy Enabled features: - with-faillock TASK [fedora.linux_system_roles.pam_pwd : Select profile password-policy] ****** task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:63 Wednesday 07 January 2026 15:58:28 -0500 (0:00:00.335) 0:00:04.035 ***** skipping: [managed-node1] => { "changed": false, "false_condition": "not pam_pwd_policy_name in __pam_pwd_authselect_current.stdout", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.pam_pwd : List authselect current profile] ***** task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:69 Wednesday 07 January 2026 15:58:28 -0500 (0:00:00.012) 0:00:04.047 ***** ok: [managed-node1] => { "changed": false, "cmd": [ "authselect", "current" ], "delta": "0:00:00.003292", "end": "2026-01-07 15:58:28.640957", "rc": 0, "start": "2026-01-07 15:58:28.637665" } STDOUT: Profile ID: custom/password-policy Enabled features: - with-faillock TASK [fedora.linux_system_roles.pam_pwd : Set enable-feature with-faillock] **** task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:74 Wednesday 07 January 2026 15:58:28 -0500 (0:00:00.337) 0:00:04.385 ***** skipping: [managed-node1] => { "changed": false, "false_condition": "not \"with-faillock\" in __pam_pwd_authselect_features.stdout", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.pam_pwd : Keep history of the last passwords used num 10] *** task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:80 Wednesday 07 January 2026 15:58:28 -0500 (0:00:00.013) 0:00:04.398 ***** ok: [managed-node1] => (item=/etc/authselect/custom/password-policy/system-auth) => { "ansible_loop_var": "item", "backup": "", "changed": false, "item": "/etc/authselect/custom/password-policy/system-auth" } ok: [managed-node1] => (item=/etc/authselect/custom/password-policy/password-auth) => { "ansible_loop_var": "item", "backup": "", "changed": false, "item": "/etc/authselect/custom/password-policy/password-auth" } TASK [fedora.linux_system_roles.pam_pwd : Enforce root for password complexity] *** task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:94 Wednesday 07 January 2026 15:58:29 -0500 (0:00:00.662) 0:00:05.061 ***** ok: [managed-node1] => (item=/etc/authselect/custom/password-policy/system-auth) => { "ansible_loop_var": "item", "backup": "", "changed": false, "item": "/etc/authselect/custom/password-policy/system-auth" } ok: [managed-node1] => (item=/etc/authselect/custom/password-policy/password-auth) => { "ansible_loop_var": "item", "backup": "", "changed": false, "item": "/etc/authselect/custom/password-policy/password-auth" } TASK [fedora.linux_system_roles.pam_pwd : Set password quality] **************** task path: /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/main.yml:17 Wednesday 07 January 2026 15:58:30 -0500 (0:00:00.690) 0:00:05.751 ***** changed: [managed-node1] => { "backup_file": "/etc/security/pwquality.conf.12433.2026-01-07@15:58:30~", "changed": true } MSG: Block inserted PLAY RECAP ********************************************************************* managed-node1 : ok=12 changed=1 unreachable=0 failed=0 skipped=3 rescued=0 ignored=0 SYSTEM ROLES ERRORS BEGIN v1 [] SYSTEM ROLES ERRORS END v1 TASKS RECAP ******************************************************************** Wednesday 07 January 2026 15:58:30 -0500 (0:00:00.428) 0:00:06.180 ***** =============================================================================== fedora.linux_system_roles.pam_pwd : Ensure authselect is installed ------ 1.04s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:27 Gathering Facts --------------------------------------------------------- 1.03s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/tests/pam_pwd/tests_default.yml:3 fedora.linux_system_roles.pam_pwd : Enforce root for password complexity --- 0.69s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:94 fedora.linux_system_roles.pam_pwd : Keep history of the last passwords used num 10 --- 0.66s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:80 fedora.linux_system_roles.pam_pwd : Deny access after number of consecutive authentication failures num 5 --- 0.46s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:2 fedora.linux_system_roles.pam_pwd : List authselect profiles ------------ 0.43s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:34 fedora.linux_system_roles.pam_pwd : Set password quality ---------------- 0.43s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/main.yml:17 fedora.linux_system_roles.pam_pwd : Re-enable access after the lock out seconds 300 --- 0.34s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:12 fedora.linux_system_roles.pam_pwd : List authselect current profile ----- 0.34s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:69 fedora.linux_system_roles.pam_pwd : List authselect current profile ----- 0.34s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:51 fedora.linux_system_roles.pam_pwd : Set option silent in /etc/security/faillock.conf --- 0.33s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:20 fedora.linux_system_roles.pam_pwd : Perform platform/version specific tasks --- 0.04s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/main.yml:4 fedora.linux_system_roles.pam_pwd : Set enable-feature with-faillock ---- 0.01s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:74 fedora.linux_system_roles.pam_pwd : Create custom authselect profile from existing profile sssd password-policy --- 0.01s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:43 fedora.linux_system_roles.pam_pwd : Select profile password-policy ------ 0.01s /tmp/collections-gHi/ansible_collections/fedora/linux_system_roles/roles/pam_pwd/tasks/setup/default.yml:63