Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package ansible-linux-system-roles for
openSUSE:Factory checked in at 2026-04-29 19:18:18
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/ansible-linux-system-roles (Old)
and /work/SRC/openSUSE:Factory/.ansible-linux-system-roles.new.30200 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "ansible-linux-system-roles"
Wed Apr 29 19:18:18 2026 rev:12 rq:1349853 version:1.2.0
Changes:
--------
---
/work/SRC/openSUSE:Factory/ansible-linux-system-roles/ansible-linux-system-roles.changes
2026-03-12 22:23:12.412500529 +0100
+++
/work/SRC/openSUSE:Factory/.ansible-linux-system-roles.new.30200/ansible-linux-system-roles.changes
2026-04-29 19:19:21.528805075 +0200
@@ -1,0 +2,9 @@
+Tue Apr 28 15:23:51 UTC 2026 - Harshvardhan Sharma
<[email protected]>
+
+- Update to version 1.2.0: add new roles and update existing
+- Add postgresql role 1.5.1
+- Add kernel_settings role 1.3.8 (SLE 16 only)
+- Update certificate role 1.4.4 -> 1.5.0:
+ - Add openSUSE Leap platform support
+
+-------------------------------------------------------------------
Old:
----
certificate-1.4.4.tar.gz
New:
----
certificate-1.5.0.tar.gz
kernel_settings-1.3.8.tar.gz
postgresql-1.5.1.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ ansible-linux-system-roles.spec ++++++
--- /var/tmp/diff_new_pack.HwFeR9/_old 2026-04-29 19:19:23.172872428 +0200
+++ /var/tmp/diff_new_pack.HwFeR9/_new 2026-04-29 19:19:23.176872592 +0200
@@ -27,13 +27,15 @@
%global mssql_version 2.6.6
%global suseconnect_version 1.0.1
%global auto_maintenance_version 1.120.5
-%global certificate_version 1.4.4
+%global certificate_version 1.5.0
%global selinux_version 1.11.1
%global podman_version 1.9.2
%global cockpit_version 1.7.4
%global aide_version 1.2.5
%global postfix_version 1.6.6
%global keylime_server_version 1.2.4
+%global postgresql_version 1.5.1
+%global kernel_settings_version 1.3.8
%if 0%{?suse_version} >= 1600
%global sle16 1
@@ -45,7 +47,7 @@
%define ansible_collection_path
%{_datadir}/ansible/collections/ansible_collections/suse/%{ansible_collection_name}
Name: ansible-linux-system-roles
-Version: 1.1.0
+Version: 1.2.0
Release: 0
Summary: Collection of Ansible roles for Linux system management
License: GPL-3.0-or-later
@@ -61,13 +63,15 @@
Source8:
%{url}/ansible-suseconnect/archive/refs/tags/%{suseconnect_version}-suse.tar.gz#/suseconnect-%{suseconnect_version}.tar.gz
Source9:
%{url}/ansible-auto_maintenance/archive/refs/tags/%{auto_maintenance_version}-suse.tar.gz#/auto_maintenance-%{auto_maintenance_version}.tar.gz
Source10:
%{url}/ansible-postfix/archive/refs/tags/%{postfix_version}-suse.tar.gz#/postfix-%{postfix_version}.tar.gz
+Source11:
%{url}/ansible-postgresql/archive/refs/tags/%{postgresql_version}-suse.tar.gz#/postgresql-%{postgresql_version}.tar.gz
%if %{sle16}
-Source11:
%{url}/ansible-certificate/archive/refs/tags/%{certificate_version}-suse.tar.gz#/certificate-%{certificate_version}.tar.gz
-Source12:
%{url}/ansible-selinux/archive/refs/tags/%{selinux_version}-suse.tar.gz#/selinux-%{selinux_version}.tar.gz
-Source13:
%{url}/ansible-podman/archive/refs/tags/%{podman_version}-suse.tar.gz#/podman-%{podman_version}.tar.gz
-Source14:
%{url}/ansible-cockpit/archive/refs/tags/%{cockpit_version}-suse.tar.gz#/cockpit-%{cockpit_version}.tar.gz
-Source15:
%{url}/ansible-aide/archive/refs/tags/%{aide_version}-suse.tar.gz#/aide-%{aide_version}.tar.gz
-Source16:
%{url}/ansible-keylime_server/archive/refs/tags/%{keylime_server_version}-suse.tar.gz#/keylime_server-%{keylime_server_version}.tar.gz
+Source12:
%{url}/ansible-certificate/archive/refs/tags/%{certificate_version}-suse.tar.gz#/certificate-%{certificate_version}.tar.gz
+Source13:
%{url}/ansible-selinux/archive/refs/tags/%{selinux_version}-suse.tar.gz#/selinux-%{selinux_version}.tar.gz
+Source14:
%{url}/ansible-podman/archive/refs/tags/%{podman_version}-suse.tar.gz#/podman-%{podman_version}.tar.gz
+Source15:
%{url}/ansible-cockpit/archive/refs/tags/%{cockpit_version}-suse.tar.gz#/cockpit-%{cockpit_version}.tar.gz
+Source16:
%{url}/ansible-aide/archive/refs/tags/%{aide_version}-suse.tar.gz#/aide-%{aide_version}.tar.gz
+Source17:
%{url}/ansible-keylime_server/archive/refs/tags/%{keylime_server_version}-suse.tar.gz#/keylime_server-%{keylime_server_version}.tar.gz
+Source18:
%{url}/ansible-kernel_settings/archive/refs/tags/%{kernel_settings_version}-suse.tar.gz#/kernel_settings-%{kernel_settings_version}.tar.gz
%endif
Source999: galaxy.yml
@@ -101,6 +105,7 @@
"suseconnect:%{suseconnect_version}"
"auto_maintenance:%{auto_maintenance_version}"
"postfix:%{postfix_version}"
+ "postgresql:%{postgresql_version}"
%if %{sle16}
"certificate:%{certificate_version}"
"selinux:%{selinux_version}"
@@ -108,6 +113,7 @@
"cockpit:%{cockpit_version}"
"aide:%{aide_version}"
"keylime_server:%{keylime_server_version}"
+ "kernel_settings:%{kernel_settings_version}"
%endif
)
++++++ certificate-1.4.4.tar.gz -> certificate-1.5.0.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/.github/workflows/ansible-lint.yml
new/ansible-certificate-1.5.0-suse/.github/workflows/ansible-lint.yml
--- old/ansible-certificate-1.4.4-suse/.github/workflows/ansible-lint.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/.github/workflows/ansible-lint.yml
2026-03-16 19:09:07.000000000 +0100
@@ -18,6 +18,9 @@
contents: read
jobs:
ansible_lint:
+ if: |
+ !((github.event_name == 'pull_request' &&
contains(github.event.pull_request.title, '[citest_skip]')) ||
+ (github.event_name == 'push' &&
contains(github.event.head_commit.message, '[citest_skip]')))
runs-on: ubuntu-latest
steps:
- name: Update pip, git
@@ -32,7 +35,7 @@
- name: Install tox, tox-lsr
run: |
set -euxo pipefail
- pip3 install
"git+https://github.com/linux-system-roles/[email protected]"
+ pip3 install
"git+https://github.com/linux-system-roles/[email protected]"
- name: Convert role to collection format
id: collection
@@ -41,7 +44,7 @@
TOXENV=collection lsr_ci_runtox
coll_dir=".tox/ansible_collections/$LSR_ROLE2COLL_NAMESPACE/$LSR_ROLE2COLL_NAME"
# cleanup after collection conversion
- rm -rf "$coll_dir/.ansible" .tox/ansible-plugin-scan
+ rm -rf "$coll_dir/.ansible" .tox/ansible-plugin-scan
"$coll_dir/.collection"
# ansible-lint action requires a .git directory???
# https://github.com/ansible/ansible-lint/blob/main/action.yml#L45
mkdir -p "$coll_dir/.git"
@@ -76,7 +79,7 @@
echo "coll_req_file=$coll_req_file" >> $GITHUB_OUTPUT
- name: Run ansible-lint
- uses: ansible/ansible-lint@v25
+ uses: ansible/ansible-lint@v26
with:
working_directory: ${{ github.workspace
}}/.tox/ansible_collections/${{ env.LSR_ROLE2COLL_NAMESPACE }}/${{
env.LSR_ROLE2COLL_NAME }}
requirements_file: ${{ steps.collection.outputs.coll_req_file }}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/.github/workflows/ansible-managed-var-comment.yml
new/ansible-certificate-1.5.0-suse/.github/workflows/ansible-managed-var-comment.yml
---
old/ansible-certificate-1.4.4-suse/.github/workflows/ansible-managed-var-comment.yml
2026-01-06 16:45:47.000000000 +0100
+++
new/ansible-certificate-1.5.0-suse/.github/workflows/ansible-managed-var-comment.yml
2026-03-16 19:09:07.000000000 +0100
@@ -15,6 +15,9 @@
contents: read
jobs:
ansible_managed_var_comment:
+ if: |
+ !((github.event_name == 'pull_request' &&
contains(github.event.pull_request.title, '[citest_skip]')) ||
+ (github.event_name == 'push' &&
contains(github.event.head_commit.message, '[citest_skip]')))
runs-on: ubuntu-latest
steps:
- name: Update pip, git
@@ -30,7 +33,7 @@
- name: Install tox, tox-lsr
run: |
set -euxo pipefail
- pip3 install
"git+https://github.com/linux-system-roles/[email protected]"
+ pip3 install
"git+https://github.com/linux-system-roles/[email protected]"
- name: Run ansible-plugin-scan
run: |
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/.github/workflows/ansible-test.yml
new/ansible-certificate-1.5.0-suse/.github/workflows/ansible-test.yml
--- old/ansible-certificate-1.4.4-suse/.github/workflows/ansible-test.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/.github/workflows/ansible-test.yml
2026-03-16 19:09:07.000000000 +0100
@@ -18,6 +18,9 @@
contents: read
jobs:
ansible_test:
+ if: |
+ !((github.event_name == 'pull_request' &&
contains(github.event.pull_request.title, '[citest_skip]')) ||
+ (github.event_name == 'push' &&
contains(github.event.head_commit.message, '[citest_skip]')))
runs-on: ubuntu-latest
steps:
- name: Update pip, git
@@ -33,7 +36,7 @@
- name: Install tox, tox-lsr
run: |
set -euxo pipefail
- pip3 install
"git+https://github.com/linux-system-roles/[email protected]"
+ pip3 install
"git+https://github.com/linux-system-roles/[email protected]"
- name: Convert role to collection format
run: |
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/.github/workflows/build_docs.yml
new/ansible-certificate-1.5.0-suse/.github/workflows/build_docs.yml
--- old/ansible-certificate-1.4.4-suse/.github/workflows/build_docs.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/.github/workflows/build_docs.yml
2026-03-16 19:09:07.000000000 +0100
@@ -91,7 +91,7 @@
run: cp ${{ env.RELEASE_VERSION }}/README.html docs/index.html
- name: Upload README.html as an artifact
- uses: actions/upload-artifact@v6
+ uses: actions/upload-artifact@v7
with:
name: README.html
path: ${{ env.RELEASE_VERSION }}/README.html
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/.github/workflows/codeql.yml
new/ansible-certificate-1.5.0-suse/.github/workflows/codeql.yml
--- old/ansible-certificate-1.4.4-suse/.github/workflows/codeql.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/.github/workflows/codeql.yml
2026-03-16 19:09:07.000000000 +0100
@@ -14,6 +14,9 @@
- cron: 20 17 * * 4
jobs:
analyze:
+ if: |
+ !((github.event_name == 'pull_request' &&
contains(github.event.pull_request.title, '[citest_skip]')) ||
+ (github.event_name == 'push' &&
contains(github.event.head_commit.message, '[citest_skip]')))
name: Analyze
runs-on: ubuntu-latest
permissions:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/.github/workflows/codespell.yml
new/ansible-certificate-1.5.0-suse/.github/workflows/codespell.yml
--- old/ansible-certificate-1.4.4-suse/.github/workflows/codespell.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/.github/workflows/codespell.yml
2026-03-16 19:09:07.000000000 +0100
@@ -7,6 +7,8 @@
contents: read
jobs:
codespell:
+ if: |
+ !(github.event_name == 'pull_request' &&
contains(github.event.pull_request.title, '[citest_skip]'))
name: Check for spelling errors
runs-on: ubuntu-latest
steps:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/.github/workflows/markdownlint.yml
new/ansible-certificate-1.5.0-suse/.github/workflows/markdownlint.yml
--- old/ansible-certificate-1.4.4-suse/.github/workflows/markdownlint.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/.github/workflows/markdownlint.yml
2026-03-16 19:09:07.000000000 +0100
@@ -16,6 +16,9 @@
contents: read
jobs:
markdownlint:
+ if: |
+ !((github.event_name == 'pull_request' &&
contains(github.event.pull_request.title, '[citest_skip]')) ||
+ (github.event_name == 'push' &&
contains(github.event.head_commit.message, '[citest_skip]')))
runs-on: ubuntu-latest
steps:
- name: Update pip, git
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/.github/workflows/python-unit-test.yml
new/ansible-certificate-1.5.0-suse/.github/workflows/python-unit-test.yml
--- old/ansible-certificate-1.4.4-suse/.github/workflows/python-unit-test.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/.github/workflows/python-unit-test.yml
2026-03-16 19:09:07.000000000 +0100
@@ -16,6 +16,9 @@
contents: read
jobs:
python:
+ if: |
+ !((github.event_name == 'pull_request' &&
contains(github.event.pull_request.title, '[citest_skip]')) ||
+ (github.event_name == 'push' &&
contains(github.event.head_commit.message, '[citest_skip]')))
strategy:
matrix:
pyver_os:
@@ -67,7 +70,7 @@
tox=tox
virtualenv=virtualenv
fi
- pip install "$tox" "$virtualenv"
"git+https://github.com/linux-system-roles/[email protected]"
+ pip install "$tox" "$virtualenv"
"git+https://github.com/linux-system-roles/[email protected]"
# If you have additional OS dependency packages e.g. libcairo2-dev
# then put them in .github/config/ubuntu-requirements.txt, one
# package per line.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/.github/workflows/qemu-kvm-integration-tests.yml
new/ansible-certificate-1.5.0-suse/.github/workflows/qemu-kvm-integration-tests.yml
---
old/ansible-certificate-1.4.4-suse/.github/workflows/qemu-kvm-integration-tests.yml
2026-01-06 16:45:47.000000000 +0100
+++
new/ansible-certificate-1.5.0-suse/.github/workflows/qemu-kvm-integration-tests.yml
2026-03-16 19:09:07.000000000 +0100
@@ -18,6 +18,9 @@
statuses: write
jobs:
scenario:
+ if: |
+ !((github.event_name == 'pull_request' &&
contains(github.event.pull_request.title, '[citest_skip]')) ||
+ (github.event_name == 'push' &&
contains(github.event.head_commit.message, '[citest_skip]')))
runs-on: ubuntu-latest
strategy:
@@ -25,25 +28,26 @@
matrix:
scenario:
# QEMU
- - { image: "centos-9", env: "qemu-ansible-core-2.16" }
- - { image: "centos-10", env: "qemu-ansible-core-2.17" }
- - { image: "fedora-42", env: "qemu-ansible-core-2.19" }
- - { image: "fedora-43", env: "qemu-ansible-core-2.19" }
- - { image: "leap-15.6", env: "qemu-ansible-core-2.18" }
+ - { image: "centos-9", env: "qemu-ansible-core-2-16" }
+ - { image: "centos-10", env: "qemu-ansible-core-2-17" }
+ - { image: "fedora-42", env: "qemu-ansible-core-2-19" }
+ - { image: "fedora-43", env: "qemu-ansible-core-2-20" }
+ - { image: "leap-15.6", env: "qemu-ansible-core-2-18" }
# container
- - { image: "centos-9", env: "container-ansible-core-2.16" }
- - { image: "centos-9-bootc", env: "container-ansible-core-2.16" }
+ - { image: "centos-9", env: "container-ansible-core-2-16" }
+ - { image: "centos-9-bootc", env: "container-ansible-core-2-16" }
# broken on non-running dbus
- # - { image: "centos-10", env: "container-ansible-core-2.17" }
- - { image: "centos-10-bootc", env: "container-ansible-core-2.17" }
- - { image: "fedora-42", env: "container-ansible-core-2.17" }
- - { image: "fedora-43", env: "container-ansible-core-2.19" }
- - { image: "fedora-42-bootc", env: "container-ansible-core-2.17" }
- - { image: "fedora-43-bootc", env: "container-ansible-core-2.19" }
+ # - { image: "centos-10", env: "container-ansible-core-2-17" }
+ - { image: "centos-10-bootc", env: "container-ansible-core-2-17" }
+ - { image: "fedora-42", env: "container-ansible-core-2-17" }
+ - { image: "fedora-43", env: "container-ansible-core-2-20" }
+ - { image: "fedora-42-bootc", env: "container-ansible-core-2-17" }
+ - { image: "fedora-43-bootc", env: "container-ansible-core-2-20" }
env:
TOX_ARGS: "--skip-tags tests::infiniband,tests::nvme,tests::scsi"
+ ANSIBLE_INJECT_FACT_VARS: "false"
steps:
- name: Checkout repo
@@ -71,7 +75,7 @@
# bootc build support (in buildah) has a separate flag
if [ "${{ matrix.scenario.image }}" != "$image" ]; then
- if ! yq -e '.galaxy_info.galaxy_tags[] | select(. ==
"containerbuild")' meta/main.yml; then
+ if ! yq -e '.galaxy_info.galaxy_tags[] | select(. ==
"containerbuild")' meta/main.yml; then
supported=
fi
else
@@ -106,7 +110,7 @@
python3 -m pip install --upgrade pip
sudo apt update
sudo apt install -y --no-install-recommends git ansible-core
genisoimage qemu-system-x86
- pip3 install
"git+https://github.com/linux-system-roles/[email protected]"
+ pip3 install
"git+https://github.com/linux-system-roles/[email protected]"
# HACK: Drop this when moving this workflow to 26.04 LTS
- name: Update podman to 5.x for compatibility with
bootc-image-builder's podman 5
@@ -171,10 +175,9 @@
if: steps.check_platform.outputs.supported &&
startsWith(matrix.scenario.env, 'container')
run: |
set -euo pipefail
- # HACK: debug.py/profile.py setup is broken
- export LSR_CONTAINER_PROFILE=false
- export LSR_CONTAINER_PRETTY=false
rc=0
+ # we cannot skip these on the first test
+ export SKIP_REQUIREMENTS=false
for t in tests/tests_*.yml; do
if tox -e ${{ matrix.scenario.env }} -- --image-name ${{
matrix.scenario.image }} $t > ${t}.log 2>&1; then
echo "PASS: $(basename $t)"
@@ -184,6 +187,8 @@
mv "${t}.log" "${t}-FAIL.log"
rc=1
fi
+ # we can skip these on subsequent runs
+ export SKIP_REQUIREMENTS=true
done
exit $rc
@@ -211,7 +216,7 @@
- name: Upload test logs on failure
if: failure()
- uses: actions/upload-artifact@v6
+ uses: actions/upload-artifact@v7
with:
name: "logs-${{ matrix.scenario.image }}-${{ matrix.scenario.env }}"
path: |
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/.github/workflows/test_converting_readme.yml
new/ansible-certificate-1.5.0-suse/.github/workflows/test_converting_readme.yml
---
old/ansible-certificate-1.4.4-suse/.github/workflows/test_converting_readme.yml
2026-01-06 16:45:47.000000000 +0100
+++
new/ansible-certificate-1.5.0-suse/.github/workflows/test_converting_readme.yml
2026-03-16 19:09:07.000000000 +0100
@@ -15,6 +15,9 @@
contents: read
jobs:
test_converting_readme:
+ if: |
+ !((github.event_name == 'pull_request' &&
contains(github.event.pull_request.title, '[citest_skip]')) ||
+ (github.event_name == 'push' &&
contains(github.event.head_commit.message, '[citest_skip]')))
runs-on: ubuntu-latest
permissions:
contents: write
@@ -40,7 +43,7 @@
--output README.html README.md
- name: Upload README.html as an artifact
- uses: actions/upload-artifact@v6
+ uses: actions/upload-artifact@v7
with:
name: README.html
path: README.html
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/.github/workflows/tft.yml
new/ansible-certificate-1.5.0-suse/.github/workflows/tft.yml
--- old/ansible-certificate-1.4.4-suse/.github/workflows/tft.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/.github/workflows/tft.yml
2026-03-16 19:09:07.000000000 +0100
@@ -72,8 +72,8 @@
meta_main=meta/main.yml
# All Fedora are supported, add latest Fedora versions to
supported_platforms
if yq '.galaxy_info.galaxy_tags[]' "$meta_main" | grep -qi fedora$;
then
- supported_platforms+=" Fedora-41"
supported_platforms+=" Fedora-42"
+ supported_platforms+=" Fedora-43"
fi
# Specific Fedora versions supported
if yq '.galaxy_info.galaxy_tags[]' "$meta_main" | grep -qiP
'fedora\d+$'; then
@@ -98,21 +98,22 @@
fail-fast: false
matrix:
include:
- - platform: Fedora-41
- ansible_version: 2.17
+ # Ensure ansible version is a string!
- platform: Fedora-42
- ansible_version: 2.19
+ ansible_version: "2.19"
+ - platform: Fedora-43
+ ansible_version: "2.20"
- platform: CentOS-7-latest
- ansible_version: 2.9
+ ansible_version: "2.9"
- platform: CentOS-Stream-8
- ansible_version: 2.9
+ ansible_version: "2.9"
# On CentOS-Stream-8, latest supported Ansible is 2.16
- platform: CentOS-Stream-8
- ansible_version: 2.16
+ ansible_version: "2.16"
- platform: CentOS-Stream-9
- ansible_version: 2.17
+ ansible_version: "2.17"
- platform: CentOS-Stream-10
- ansible_version: 2.17
+ ansible_version: "2.17"
runs-on: ubuntu-latest
env:
ARTIFACTS_DIR_NAME: "tf_${{ github.event.repository.name }}-${{
github.event.issue.number }}_\
@@ -168,6 +169,7 @@
SR_ARTIFACTS_DIR=${{ steps.set_vars.outputs.ARTIFACTS_DIR }};\
SR_TEST_LOCAL_CHANGES=false;\
SR_LSR_USER=${{ vars.SR_LSR_USER }};\
+ SR_ANSIBLE_INJECT_FACT_VARS=false;\
SR_ARTIFACTS_URL=${{ steps.set_vars.outputs.ARTIFACTS_URL }}"
# Note that LINUXSYSTEMROLES_SSH_KEY must be single-line, TF doesn't
read multi-line variables fine.
secrets: "SR_LSR_DOMAIN=${{ secrets.SR_LSR_DOMAIN }};\
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/.github/workflows/woke.yml
new/ansible-certificate-1.5.0-suse/.github/workflows/woke.yml
--- old/ansible-certificate-1.4.4-suse/.github/workflows/woke.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/.github/workflows/woke.yml
2026-03-16 19:09:07.000000000 +0100
@@ -5,6 +5,8 @@
- pull_request
jobs:
woke:
+ if: |
+ !(github.event_name == 'pull_request' &&
contains(github.event.pull_request.title, '[citest_skip]'))
name: Detect non-inclusive language
runs-on: ubuntu-latest
steps:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.4.4-suse/CHANGELOG.md
new/ansible-certificate-1.5.0-suse/CHANGELOG.md
--- old/ansible-certificate-1.4.4-suse/CHANGELOG.md 2026-01-06
16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/CHANGELOG.md 2026-03-16
19:09:07.000000000 +0100
@@ -1,6 +1,28 @@
Changelog
=========
+[1.5.0] - 2026-03-16
+--------------------
+
+### New Features
+
+- feat: Add openSUSE Leap vars (#317)
+
+### Other Changes
+
+- ci: use ANSIBLE_INJECT_FACT_VARS=false by default for testing (#307)
+- ci: bump ansible/ansible-lint from 25 to 26 (#308)
+- ci: skip most CI checks if title contains citest skip [citest_skip] (#309)
+- ci: ansible-lint - remove .collection directory from converted collection
[citest_skip] (#310)
+- ci: tox-lsr version 3.15.0 [citest_skip] (#311)
+- ci: Add Fedora 43, remove Fedora 41 from Testing Farm CI (#312)
+- ci: Ansible version must be string, not float [citest_skip] (#313)
+- ci: bump actions/upload-artifact from 6 to 7 (#314)
+- ci: tox-lsr 3.16.0 - fix qemu tox test failures - rename to
qemu-ansible-core-X-Y [citest_skip] (#315)
+- ci: tox-lsr 3.17.0 - container test improvements, use ansible 2.20 for
fedora 43 [citest_skip] (#316)
+- refactor: fix python black formatting (#318)
+- ci: tox-lsr 3.17.1 - previous update broke container tests, this fixes them
[citest_skip] (#319)
+
[1.4.4] - 2026-01-06
--------------------
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.4.4-suse/README-ostree.md
new/ansible-certificate-1.5.0-suse/README-ostree.md
--- old/ansible-certificate-1.4.4-suse/README-ostree.md 2026-01-06
16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/README-ostree.md 2026-03-16
19:09:07.000000000 +0100
@@ -20,8 +20,8 @@
.ostree/get_ostree_data.sh packages runtime DISTRO-VERSION FORMAT
```
-`DISTRO-VERSION` is in the format that Ansible uses for `ansible_distribution`
-and `ansible_distribution_version` - for example, `Fedora-38`, `CentOS-8`,
+`DISTRO-VERSION` is in the format that Ansible uses for
`ansible_facts["distribution"]`
+and `ansible_facts["distribution_version"]` - for example, `Fedora-38`,
`CentOS-8`,
`RedHat-9.4`
`FORMAT` is one of `toml`, `json`, `yaml`, `raw`
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.4.4-suse/contributing.md
new/ansible-certificate-1.5.0-suse/contributing.md
--- old/ansible-certificate-1.4.4-suse/contributing.md 2026-01-06
16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/contributing.md 2026-03-16
19:09:07.000000000 +0100
@@ -85,7 +85,7 @@
you can use e.g.
```bash
- tox -e qemu-ansible-core-2.14 -- --image-name centos-9
tests/tests_default.yml
+ tox -e qemu-ansible-core-2-20 -- --image-name centos-9
tests/tests_default.yml
```
There are many command line options and environment variables which can be used
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/library/certificate_request.py
new/ansible-certificate-1.5.0-suse/library/certificate_request.py
--- old/ansible-certificate-1.4.4-suse/library/certificate_request.py
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/library/certificate_request.py
2026-03-16 19:09:07.000000000 +0100
@@ -311,7 +311,6 @@
from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils.certificate_lsr.providers import providers
-
KEY_USAGE_CHOICES = [
"digitalSignature",
"nonRepudiation",
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/meta/collection-requirements.yml
new/ansible-certificate-1.5.0-suse/meta/collection-requirements.yml
--- old/ansible-certificate-1.4.4-suse/meta/collection-requirements.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/meta/collection-requirements.yml
2026-03-16 19:09:07.000000000 +0100
@@ -2,3 +2,5 @@
---
collections:
- name: ansible.posix
+ - name: community.general
+ version: '>=6.6.0,<12.0.0'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.4.4-suse/meta/main.yml
new/ansible-certificate-1.5.0-suse/meta/main.yml
--- old/ansible-certificate-1.4.4-suse/meta/main.yml 2026-01-06
16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/meta/main.yml 2026-03-16
19:09:07.000000000 +0100
@@ -27,6 +27,7 @@
- fedora
- redhat
- rhel
+ - leap
- ssl
- system
- tls
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/module_utils/certificate_lsr/providers/base.py
new/ansible-certificate-1.5.0-suse/module_utils/certificate_lsr/providers/base.py
---
old/ansible-certificate-1.4.4-suse/module_utils/certificate_lsr/providers/base.py
2026-01-06 16:45:47.000000000 +0100
+++
new/ansible-certificate-1.5.0-suse/module_utils/certificate_lsr/providers/base.py
2026-03-16 19:09:07.000000000 +0100
@@ -661,7 +661,7 @@
return (owner, group, mode)
def _set_user_and_group_if_different(self):
- (owner, group, mode) = self._get_permissions()
+ owner, group, mode = self._get_permissions()
if not any([owner, group, mode]):
return False
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/module_utils/certificate_lsr/providers/certmonger.py
new/ansible-certificate-1.5.0-suse/module_utils/certificate_lsr/providers/certmonger.py
---
old/ansible-certificate-1.4.4-suse/module_utils/certificate_lsr/providers/certmonger.py
2026-01-06 16:45:47.000000000 +0100
+++
new/ansible-certificate-1.5.0-suse/module_utils/certificate_lsr/providers/certmonger.py
2026-03-16 19:09:07.000000000 +0100
@@ -245,7 +245,7 @@
def _set_user_and_group_if_different(self):
if not self.module.params.get("booted"):
- (owner, group, mode) = self._get_permissions()
+ owner, group, mode = self._get_permissions()
if not any([owner, group, mode]):
return False
if owner:
@@ -420,8 +420,7 @@
return
with open(unit_path, "w") as f:
- f.write(
- """[Unit]
+ f.write("""[Unit]
Description=Request certificates via certmonger from System Role
Documentation=https://github.com/linux-system-roles/certificate/
ConditionFileExists={commands_file}
@@ -435,10 +434,7 @@
[Install]
WantedBy=multi-user.target
-""".format(
- commands_file=commands_file
- )
- )
+""".format(commands_file=commands_file))
# Enable the service
systemctl_cmd = ["systemctl", "enable", unit_name]
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/module_utils/certificate_lsr/providers/providers.py
new/ansible-certificate-1.5.0-suse/module_utils/certificate_lsr/providers/providers.py
---
old/ansible-certificate-1.4.4-suse/module_utils/certificate_lsr/providers/providers.py
2026-01-06 16:45:47.000000000 +0100
+++
new/ansible-certificate-1.5.0-suse/module_utils/certificate_lsr/providers/providers.py
2026-03-16 19:09:07.000000000 +0100
@@ -8,7 +8,6 @@
from ansible.module_utils.certificate_lsr.providers import certmonger
-
# fmt: off
PROVIDERS = (
("certmonger", certmonger.CertificateRequestCertmongerProvider),
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/plans/test_playbooks_parallel.fmf
new/ansible-certificate-1.5.0-suse/plans/test_playbooks_parallel.fmf
--- old/ansible-certificate-1.4.4-suse/plans/test_playbooks_parallel.fmf
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/plans/test_playbooks_parallel.fmf
2026-03-16 19:09:07.000000000 +0100
@@ -18,9 +18,10 @@
hardware:
memory: '>= 4096 MB'
environment:
- SR_ANSIBLE_VER: 2.17
+ # ensure versions are strings!
+ SR_ANSIBLE_VER: "2.17"
SR_REPO_NAME: certificate
- SR_PYTHON_VERSION: 3.12
+ SR_PYTHON_VERSION: "3.12"
SR_ONLY_TESTS: "" # tests_default.yml
SR_TEST_LOCAL_CHANGES: true
SR_PR_NUM: ""
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_basic_ipa.yml
new/ansible-certificate-1.5.0-suse/tests/tests_basic_ipa.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_basic_ipa.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_basic_ipa.yml
2026-03-16 19:09:07.000000000 +0100
@@ -20,7 +20,8 @@
- name: Skip if not supported
meta: end_host
- when: __ostree_booted_stat.stat.exists
+ when: __ostree_booted_stat.stat.exists or
+ ansible_facts['os_family'] == 'Suse'
- name: Setup IPA
import_tasks: tasks/setup_ipa.yml
@@ -41,6 +42,12 @@
ca: ipa
group: ftp
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
+
- name: Verify certificates
include_tasks: tasks/assert_certificate_parameters.yml
loop: "{{ certificates }}"
@@ -48,8 +55,8 @@
loop_var: cert
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_basic_ipa.crt
- key_path: /etc/pki/tls/private/mycert_basic_ipa.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_basic_ipa.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_basic_ipa.key"
subject:
- name: commonName
oid: 2.5.4.3
@@ -73,8 +80,8 @@
- key_encipherment
- data_encipherment
- - path: /etc/pki/tls/certs/groupcert.crt
- key_path: /etc/pki/tls/private/groupcert.key
+ - path: "{{ __certificate_default_directory }}/certs/groupcert.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/groupcert.key"
owner: root
group: ftp
mode: "0640"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_basic_self_signed.yml
new/ansible-certificate-1.5.0-suse/tests/tests_basic_self_signed.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_basic_self_signed.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_basic_self_signed.yml
2026-03-16 19:09:07.000000000 +0100
@@ -1,7 +1,6 @@
---
- name: Issue simple self-signed certificate
hosts: all
-
vars:
certificate_requests:
- name: mycert_basic_self_signed
@@ -12,10 +11,16 @@
- name: Verify certificate
hosts: all
+ pre_tasks:
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_basic_self_signed.crt
- key_path: /etc/pki/tls/private/mycert_basic_self_signed.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_basic_self_signed.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_basic_self_signed.key"
subject:
- name: commonName
oid: 2.5.4.3
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_dns_ip_email.yml
new/ansible-certificate-1.5.0-suse/tests/tests_dns_ip_email.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_dns_ip_email.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_dns_ip_email.yml
2026-03-16 19:09:07.000000000 +0100
@@ -23,10 +23,16 @@
- name: Verify certificate
hosts: all
+ pre_tasks:
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_dns_ip_email.crt
- key_path: /etc/pki/tls/private/mycert_dns_ip_email.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_dns_ip_email.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_dns_ip_email.key"
subject:
- name: commonName
oid: 2.5.4.3
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_fs_attrs.yml
new/ansible-certificate-1.5.0-suse/tests/tests_fs_attrs.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_fs_attrs.yml 2026-01-06
16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_fs_attrs.yml 2026-03-16
19:09:07.000000000 +0100
@@ -2,6 +2,23 @@
- name: Ensure UID and GID exists
hosts: all
tasks:
+ - name: Ensure ftp group exists
+ group:
+ name: ftp
+ system: true
+ when:
+ - not __bootc_validation | d(false)
+ - ansible_facts['os_family'] == 'Suse'
+
+ - name: Ensure ftp user exists
+ user:
+ name: ftp
+ group: ftp
+ system: true
+ when:
+ - not __bootc_validation | d(false)
+ - ansible_facts['os_family'] == 'Suse'
+
- name: Ensure user exists
user:
name: user1
@@ -31,6 +48,12 @@
ca: self-sign
when: not __bootc_validation | d(false)
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
+
- name: Verify each user/group certificate
include_tasks: tasks/assert_certificate_parameters.yml
loop: "{{ certificates }}"
@@ -38,8 +61,8 @@
loop_var: cert
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_fs_attrs.crt
- key_path: /etc/pki/tls/private/mycert_fs_attrs.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_fs_attrs.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_fs_attrs.key"
subject:
- name: commonName
oid: 2.5.4.3
@@ -50,8 +73,8 @@
owner: ftp
group: ftp
mode: "0640"
- - path: /etc/pki/tls/certs/certid.crt
- key_path: /etc/pki/tls/private/certid.key
+ - path: "{{ __certificate_default_directory }}/certs/certid.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/certid.key"
subject:
- name: commonName
oid: 2.5.4.3
@@ -96,8 +119,8 @@
loop_var: cert
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_fs_attrs_mode.crt
- key_path: /etc/pki/tls/private/mycert_fs_attrs_mode.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_fs_attrs_mode.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_fs_attrs_mode.key"
subject:
- name: commonName
oid: 2.5.4.3
@@ -108,8 +131,8 @@
owner: ftp
group: ftp
mode: "0620"
- - path: /etc/pki/tls/certs/certid_mode.crt
- key_path: /etc/pki/tls/private/certid_mode.key
+ - path: "{{ __certificate_default_directory }}/certs/certid_mode.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/certid_mode.key"
subject:
- name: commonName
oid: 2.5.4.3
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_key_size.yml
new/ansible-certificate-1.5.0-suse/tests/tests_key_size.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_key_size.yml 2026-01-06
16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_key_size.yml 2026-03-16
19:09:07.000000000 +0100
@@ -14,6 +14,13 @@
dns: www.example.com
ca: self-sign
key_size: 1024
+
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
+
- name: Verify each certificate
include_tasks: tasks/assert_certificate_parameters.yml
loop: "{{ certificates }}"
@@ -21,8 +28,8 @@
loop_var: cert
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_key_size.crt
- key_path: /etc/pki/tls/private/mycert_key_size.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_key_size.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_key_size.key"
subject:
- name: commonName
oid: 2.5.4.3
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_key_size_reissue.yml
new/ansible-certificate-1.5.0-suse/tests/tests_key_size_reissue.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_key_size_reissue.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_key_size_reissue.yml
2026-03-16 19:09:07.000000000 +0100
@@ -16,6 +16,13 @@
dns: www.example.com
ca: self-sign
key_size: 4096
+
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
+
- name: Verify each certificate
include_tasks: tasks/assert_certificate_parameters.yml
loop: "{{ certificates }}"
@@ -23,8 +30,8 @@
loop_var: cert
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_key_size.crt
- key_path: /etc/pki/tls/private/mycert_key_size.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_key_size.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_key_size.key"
subject:
- name: commonName
oid: 2.5.4.3
@@ -73,8 +80,8 @@
loop_var: cert
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_key_size.crt
- key_path: /etc/pki/tls/private/mycert_key_size.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_key_size.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_key_size.key"
subject:
- name: commonName
oid: 2.5.4.3
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_key_usage_and_extended_key_usage.yml
new/ansible-certificate-1.5.0-suse/tests/tests_key_usage_and_extended_key_usage.yml
---
old/ansible-certificate-1.4.4-suse/tests/tests_key_usage_and_extended_key_usage.yml
2026-01-06 16:45:47.000000000 +0100
+++
new/ansible-certificate-1.5.0-suse/tests/tests_key_usage_and_extended_key_usage.yml
2026-03-16 19:09:07.000000000 +0100
@@ -1,7 +1,6 @@
---
- name: Issue simple self-signed certificate
hosts: all
-
vars:
certificate_requests:
- name: mycert_key_usage_and_extended_key_usage
@@ -21,11 +20,17 @@
- name: Verify certificate
hosts: all
+ pre_tasks:
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_key_usage_and_extended_key_usage.crt
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_key_usage_and_extended_key_usage.crt"
key_path: >-
- /etc/pki/tls/private/mycert_key_usage_and_extended_key_usage.key
+ {{ __certificate_default_directory
}}/private/mycert_key_usage_and_extended_key_usage.key
subject:
- name: commonName
oid: 2.5.4.3
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_many_self_signed.yml
new/ansible-certificate-1.5.0-suse/tests/tests_many_self_signed.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_many_self_signed.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_many_self_signed.yml
2026-03-16 19:09:07.000000000 +0100
@@ -26,6 +26,12 @@
changed_when: true
when: ansible_connection == "buildah"
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
+
- name: Verify each certificate
include_tasks: tasks/assert_certificate_parameters.yml
loop: "{{ certificates }}"
@@ -33,8 +39,8 @@
loop_var: cert
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_many_self_signed.crt
- key_path: /etc/pki/tls/private/mycert_many_self_signed.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_many_self_signed.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_many_self_signed.key"
subject:
- name: commonName
oid: 2.5.4.3
@@ -42,8 +48,8 @@
subject_alt_name:
- name: DNS
value: www.example.com
- - path: /etc/pki/tls/certs/other-cert.crt
- key_path: /etc/pki/tls/private/other-cert.key
+ - path: "{{ __certificate_default_directory }}/certs/other-cert.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/other-cert.key"
subject:
- name: commonName
oid: 2.5.4.3
@@ -51,8 +57,8 @@
subject_alt_name:
- name: DNS
value: www.example.org
- - path: /etc/pki/tls/certs/another-cert.crt
- key_path: /etc/pki/tls/private/another-cert.key
+ - path: "{{ __certificate_default_directory
}}/certs/another-cert.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/another-cert.key"
subject:
- name: commonName
oid: 2.5.4.3
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_no_auto_renew.yml
new/ansible-certificate-1.5.0-suse/tests/tests_no_auto_renew.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_no_auto_renew.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_no_auto_renew.yml
2026-03-16 19:09:07.000000000 +0100
@@ -1,7 +1,6 @@
---
- name: Issue simple self-signed certificate
hosts: all
-
vars:
certificate_requests:
- name: mycert_no_auto_renew
@@ -15,11 +14,17 @@
- linux-system-roles.certificate
- name: Verify certificate
+ pre_tasks:
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
hosts: all
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_no_auto_renew.crt
- key_path: /etc/pki/tls/private/mycert_no_auto_renew.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_no_auto_renew.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_no_auto_renew.key"
subject:
- name: commonName
oid: 2.5.4.3
@@ -28,8 +33,8 @@
- name: DNS
value: www.example.com
auto_renew: false
- - path: /etc/pki/tls/certs/defaultcert.crt
- key_path: /etc/pki/tls/private/defaultcert.key
+ - path: "{{ __certificate_default_directory }}/certs/defaultcert.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/defaultcert.key"
subject:
- name: commonName
oid: 2.5.4.3
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_not_wait_for_cert.yml
new/ansible-certificate-1.5.0-suse/tests/tests_not_wait_for_cert.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_not_wait_for_cert.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_not_wait_for_cert.yml
2026-03-16 19:09:07.000000000 +0100
@@ -1,7 +1,6 @@
---
- name: Issue simple self-signed certificate
hosts: all
-
vars:
certificate_wait: false
certificate_requests:
@@ -13,10 +12,16 @@
- name: Verify certificate
hosts: all
+ pre_tasks:
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_not_wait_for_cert.crt
- key_path: /etc/pki/tls/private/mycert_not_wait_for_cert.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_not_wait_for_cert.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_not_wait_for_cert.key"
subject:
- name: commonName
oid: 2.5.4.3
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_principal.yml
new/ansible-certificate-1.5.0-suse/tests/tests_principal.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_principal.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_principal.yml
2026-03-16 19:09:07.000000000 +0100
@@ -12,10 +12,16 @@
- name: Verify certificate
hosts: all
+ pre_tasks:
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_principal.crt
- key_path: /etc/pki/tls/private/mycert_principal.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_principal.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_principal.key"
subject:
- name: commonName
oid: 2.5.4.3
@@ -36,7 +42,6 @@
loop_control:
loop_var: cert
-
- name: Test issuing certificate with invalid principal.
hosts: all
vars:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_provider.yml
new/ansible-certificate-1.5.0-suse/tests/tests_provider.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_provider.yml 2026-01-06
16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_provider.yml 2026-03-16
19:09:07.000000000 +0100
@@ -12,10 +12,16 @@
- name: Verify certificate
hosts: all
+ pre_tasks:
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_provider.crt
- key_path: /etc/pki/tls/private/mycert_provider.key
+ - path: "{{ __certificate_default_directory }}/certs/mycert_provider.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_provider.key"
subject:
- name: commonName
oid: 2.5.4.3
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_run_hooks.yml
new/ansible-certificate-1.5.0-suse/tests/tests_run_hooks.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_run_hooks.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_run_hooks.yml
2026-03-16 19:09:07.000000000 +0100
@@ -1,7 +1,6 @@
---
- name: Issue simple self-signed certificate
hosts: all
-
vars:
certificate_requests:
- name: mycert_run_hooks
@@ -16,10 +15,16 @@
- name: Verify certificate
hosts: all
+ pre_tasks:
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_run_hooks.crt
- key_path: /etc/pki/tls/private/mycert_run_hooks.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_run_hooks.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_run_hooks.key"
subject:
- name: commonName
oid: 2.5.4.3
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_subject.yml
new/ansible-certificate-1.5.0-suse/tests/tests_subject.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_subject.yml 2026-01-06
16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_subject.yml 2026-03-16
19:09:07.000000000 +0100
@@ -1,7 +1,6 @@
---
- name: Issue simple self-signed certificate
hosts: all
-
vars:
certificate_requests:
- name: mycert_subject
@@ -18,10 +17,16 @@
- name: Verify certificate
hosts: all
+ pre_tasks:
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_subject.crt
- key_path: /etc/pki/tls/private/mycert_subject.key
+ - path: "{{ __certificate_default_directory }}/certs/mycert_subject.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_subject.key"
subject:
- name: countryName
oid: 2.5.4.6
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.4.4-suse/tests/tests_subject_complex.yml
new/ansible-certificate-1.5.0-suse/tests/tests_subject_complex.yml
--- old/ansible-certificate-1.4.4-suse/tests/tests_subject_complex.yml
2026-01-06 16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/tests/tests_subject_complex.yml
2026-03-16 19:09:07.000000000 +0100
@@ -2,7 +2,6 @@
- name: Issue simple self-signed certificate
hosts: all
become: true
-
vars:
certificate_requests:
- name: mycert_subject_complex
@@ -15,12 +14,18 @@
- name: Verify certificate
hosts: all
+ pre_tasks:
+ - name: Load certificate role platform variables
+ include_role:
+ name: linux-system-roles.certificate
+ tasks_from: set_vars.yml
+ public: true
become: true
gather_facts: true
vars:
certificates:
- - path: /etc/pki/tls/certs/mycert_subject_complex.crt
- key_path: /etc/pki/tls/private/mycert_subject_complex.key
+ - path: "{{ __certificate_default_directory
}}/certs/mycert_subject_complex.crt"
+ key_path: "{{ __certificate_default_directory
}}/private/mycert_subject_complex.key"
subject:
- name: emailAddress
oid: 1.2.840.113549.1.9.1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.4.4-suse/vars/SLES_15.yml
new/ansible-certificate-1.5.0-suse/vars/SLES_15.yml
--- old/ansible-certificate-1.4.4-suse/vars/SLES_15.yml 2026-01-06
16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/vars/SLES_15.yml 2026-03-16
19:09:07.000000000 +0100
@@ -5,6 +5,6 @@
__certificate_default_directory: /etc/ssl
__certificate_packages:
- - python3-cryptography
- - python3-dbus-python
- - python3-pyasn1
+ - python311-cryptography
+ - python311-dbus-python
+ - python311-pyasn1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.4.4-suse/vars/SLES_16.yml
new/ansible-certificate-1.5.0-suse/vars/SLES_16.yml
--- old/ansible-certificate-1.4.4-suse/vars/SLES_16.yml 2026-01-06
16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/vars/SLES_16.yml 1970-01-01
01:00:00.000000000 +0100
@@ -1,10 +0,0 @@
-# SPDX-License-Identifier: MIT
----
-# Put internal variables here with SLES_16 specific values.
-
-__certificate_default_directory: /etc/ssl
-
-__certificate_packages:
- - python313-cryptography
- - python313-dbus-python
- - python313-pyasn1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.4.4-suse/vars/SLES_SAP_15.yml
new/ansible-certificate-1.5.0-suse/vars/SLES_SAP_15.yml
--- old/ansible-certificate-1.4.4-suse/vars/SLES_SAP_15.yml 2026-01-06
16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/vars/SLES_SAP_15.yml 2026-03-16
19:09:07.000000000 +0100
@@ -5,6 +5,6 @@
__certificate_default_directory: /etc/ssl
__certificate_packages:
- - python3-cryptography
- - python3-dbus-python
- - python3-pyasn1
+ - python311-cryptography
+ - python311-dbus-python
+ - python311-pyasn1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.4.4-suse/vars/SLES_SAP_16.yml
new/ansible-certificate-1.5.0-suse/vars/SLES_SAP_16.yml
--- old/ansible-certificate-1.4.4-suse/vars/SLES_SAP_16.yml 2026-01-06
16:45:47.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/vars/SLES_SAP_16.yml 1970-01-01
01:00:00.000000000 +0100
@@ -1,10 +0,0 @@
-# SPDX-License-Identifier: MIT
----
-# Put internal variables here with SLES_SAP_16 specific values.
-
-__certificate_default_directory: /etc/ssl
-
-__certificate_packages:
- - python313-cryptography
- - python313-dbus-python
- - python313-pyasn1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.4.4-suse/vars/Suse.yml
new/ansible-certificate-1.5.0-suse/vars/Suse.yml
--- old/ansible-certificate-1.4.4-suse/vars/Suse.yml 1970-01-01
01:00:00.000000000 +0100
+++ new/ansible-certificate-1.5.0-suse/vars/Suse.yml 2026-03-16
19:09:07.000000000 +0100
@@ -0,0 +1,10 @@
+# SPDX-License-Identifier: MIT
+---
+# SUSE os_family specific values.
+
+__certificate_default_directory: /etc/ssl
+
+__certificate_packages:
+ - python3-cryptography
+ - python3-dbus-python
+ - python3-pyasn1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' "old/ansible-certificate-1.4.4-suse/vars/openSUSE
Leap_15.yml" "new/ansible-certificate-1.5.0-suse/vars/openSUSE Leap_15.yml"
--- "old/ansible-certificate-1.4.4-suse/vars/openSUSE Leap_15.yml"
1970-01-01 01:00:00.000000000 +0100
+++ "new/ansible-certificate-1.5.0-suse/vars/openSUSE Leap_15.yml"
2026-03-16 19:09:07.000000000 +0100
@@ -0,0 +1,12 @@
+# SPDX-License-Identifier: MIT
+---
+# openSUSE Leap 15.x specific values.
+# Leap 15.x uses python311 as the ansible interpreter since
+# ansible-core 2.18+ requires Python 3.8+ and system python3 is 3.6.
+
+__certificate_default_directory: /etc/ssl
+
+__certificate_packages:
+ - python311-cryptography
+ - python311-dbus-python
+ - python311-pyasn1