Seems like a bug to me.
Technically, the conntrack match supersedes - and so obsoletes - the
state match. But practically the state match is not obsoleted in any
way.
The ansible iptables module is doing:
/sbin/iptables -t filter -A INPUT -m conntrack -j ACCEPT -m state
--state ESTABLISHED,RELATED
So, there is no argument passed to the conntrack match. Ideally, it
should have been:
/sbin/iptables -t filter -A INPUT -m conntrack -j ACCEPT --ctstate
ESTABLISHED,RELATED
For now it seems that you can get around this problem by
removing/commenting 'match: conntrack' and then the module will
produce:
/sbin/iptables -t filter -A INPUT -j ACCEPT -m state --state ESTABLISHED,RELATED
> --
> You received this message because you are subscribed to the Google Groups
> "Ansible Project" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
ansible-proje...@googlegroups.com.
> To post to this group, send email to
ansible...@googlegroups.com.
> To view this discussion on the web visit
>
https://groups.google.com/d/msgid/ansible-project/27b43f37-f541-45c8-9f75-6a6b76e2fdb8%40googlegroups.com.
> For more options, visit
https://groups.google.com/d/optout.
--
Nehal J Wani