Log: /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/logs/tls-issue-cert-manager.log WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 + main + create_infra tls-issue-cert-manager-19787 + local ns=tls-issue-cert-manager-19787 + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.OENGWDOcf7 ++ mktemp + local LAST_ERR=/tmp/tmp.wOo8QIAGjs + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.OENGWDOcf7 customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.wOo8QIAGjs + rm /tmp/tmp.OENGWDOcf7 /tmp/tmp.wOo8QIAGjs + return 0 ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/crd.yaml ++ grep -v '\-\-\-' + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + grep -v NAMESPACE + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.j86NAxd5Az ++ mktemp + local LAST_ERR=/tmp/tmp.WTPl01JY0Z + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.j86NAxd5Az + cat /tmp/tmp.WTPl01JY0Z + rm /tmp/tmp.j86NAxd5Az /tmp/tmp.WTPl01JY0Z + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.M4djurfyUB ++ mktemp + local LAST_ERR=/tmp/tmp.GItj8AsQIH + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.M4djurfyUB + cat /tmp/tmp.GItj8AsQIH + rm /tmp/tmp.M4djurfyUB /tmp/tmp.GItj8AsQIH + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbs" + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbs" + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.84ujsHb1vy ++ mktemp + local LAST_ERR=/tmp/tmp.ojE3vIUjyC + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.84ujsHb1vy + cat /tmp/tmp.ojE3vIUjyC + rm /tmp/tmp.84ujsHb1vy /tmp/tmp.ojE3vIUjyC + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.bj5oTLnr5P ++ mktemp + local LAST_ERR=/tmp/tmp.HKNVCO3xgq + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.bj5oTLnr5P clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.HKNVCO3xgq + rm /tmp/tmp.bj5oTLnr5P /tmp/tmp.HKNVCO3xgq + return 0 + check_crd_for_deletion PR-1536-4cc529f8 + local git_tag=PR-1536-4cc529f8 ++ curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/PR-1536-4cc529f8/deploy/crd.yaml ++ yq eval .metadata.name ++ /usr/bin/sed s/---//g ++ /usr/bin/sed ':a;N;$!ba;s/\n/ /g' + for crd_name in '$(curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/${git_tag}/deploy/crd.yaml | yq eval '\''.metadata.name'\'' | $sed '\''s/---//g'\'' | $sed '\'':a;N;$!ba;s/\n/ /g'\'')' ++ kubectl_bin get crd/null -o 'jsonpath={.status.conditions[-1].type}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Cz1Xf1tpeK +++ mktemp ++ local LAST_ERR=/tmp/tmp.1lbnOFgyam ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.Cz1Xf1tpeK ++ cat /tmp/tmp.1lbnOFgyam Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 0 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.Cz1Xf1tpeK ++ cat /tmp/tmp.1lbnOFgyam Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 4 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.Cz1Xf1tpeK ++ cat /tmp/tmp.1lbnOFgyam Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 8 ++ cat /tmp/tmp.Cz1Xf1tpeK ++ cat /tmp/tmp.1lbnOFgyam Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ rm /tmp/tmp.Cz1Xf1tpeK /tmp/tmp.1lbnOFgyam ++ return 1 + [[ '' == \T\e\r\m\i\n\a\t\i\n\g ]] + '[' -n psmdb-operator ']' + create_namespace psmdb-operator + local namespace=psmdb-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + egrep -v '^kube-|^default|Terminating|psmdb-operator|openshift|gke-mcs|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces psmdb-operator' + xargs kubectl delete ns + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace psmdb-operator --ignore-not-found + kubectl_bin get ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.fEDcWrzjj6 ++ mktemp + local LAST_OUT=/tmp/tmp.oJplOwT114 ++ mktemp + local LAST_ERR=/tmp/tmp.AQBYyBbUla + local exit_status=0 + local timeout=4 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.uButwP5As7 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + for i in '$(seq 0 2)' + set +e + kubectl delete namespace psmdb-operator --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.fEDcWrzjj6 + cat /tmp/tmp.AQBYyBbUla + rm /tmp/tmp.fEDcWrzjj6 /tmp/tmp.AQBYyBbUla + return 0 namespace "cert-manager" deleted namespace "tls-issue-cert-manager-23684" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.oJplOwT114 namespace "psmdb-operator" deleted + cat /tmp/tmp.uButwP5As7 + rm /tmp/tmp.oJplOwT114 /tmp/tmp.uButwP5As7 + return 0 + kubectl_bin wait --for=delete namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.IxcAUDHGI1 ++ mktemp + local LAST_ERR=/tmp/tmp.AqEWD0woxd + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.IxcAUDHGI1 + cat /tmp/tmp.AqEWD0woxd + rm /tmp/tmp.IxcAUDHGI1 /tmp/tmp.AqEWD0woxd + return 0 + desc 'create namespace psmdb-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.9ue2RTGPvJ ++ mktemp + local LAST_ERR=/tmp/tmp.aZvkyFYtPr + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.9ue2RTGPvJ namespace/psmdb-operator created + cat /tmp/tmp.aZvkyFYtPr + rm /tmp/tmp.9ue2RTGPvJ /tmp/tmp.aZvkyFYtPr + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.Vpb8FFRIsH +++ mktemp ++ local LAST_ERR=/tmp/tmp.FByJpBtENq ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Vpb8FFRIsH ++ cat /tmp/tmp.FByJpBtENq ++ rm /tmp/tmp.Vpb8FFRIsH /tmp/tmp.FByJpBtENq ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1536-4cc529f8-11-cluster4 --namespace=psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.EEw0XHV0qf ++ mktemp + local LAST_ERR=/tmp/tmp.0qZdYUv4Ig + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1536-4cc529f8-11-cluster4 --namespace=psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.EEw0XHV0qf Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-1536-4cc529f8-11-cluster4" modified. + cat /tmp/tmp.0qZdYUv4Ig + rm /tmp/tmp.EEw0XHV0qf /tmp/tmp.0qZdYUv4Ig + return 0 + deploy_operator + desc 'start PSMDB operator' + set +o xtrace ----------------------------------------------------------------------------------- start PSMDB operator ----------------------------------------------------------------------------------- + local cr_file + '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/conf/crd.yaml ']' + cr_file=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/crd.yaml + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.gPz7ZSINRz ++ mktemp + local LAST_ERR=/tmp/tmp.93imQw2HFc + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.gPz7ZSINRz customresourcedefinition.apiextensions.k8s.io/perconaservermongodbbackups.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbrestores.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbs.psmdb.percona.com serverside-applied + cat /tmp/tmp.93imQw2HFc + rm /tmp/tmp.gPz7ZSINRz /tmp/tmp.93imQw2HFc + return 0 + '[' -n psmdb-operator ']' + apply_rbac cw-rbac + local operator_namespace=psmdb-operator + local rbac=cw-rbac + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/cw-rbac.yaml + sed -e 's^namespace: .*^namespace: psmdb-operator^' + kubectl_bin apply -n psmdb-operator -f - ++ mktemp + local LAST_OUT=/tmp/tmp.JXTkjnHZpY ++ mktemp + local LAST_ERR=/tmp/tmp.9i5A9HLnoZ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -n psmdb-operator -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.JXTkjnHZpY clusterrole.rbac.authorization.k8s.io/percona-server-mongodb-operator created serviceaccount/percona-server-mongodb-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-server-mongodb-operator created + cat /tmp/tmp.9i5A9HLnoZ + rm /tmp/tmp.JXTkjnHZpY /tmp/tmp.9i5A9HLnoZ + return 0 + kubectl_bin apply -f - + yq eval ' (.spec.template.spec.containers[].image = "perconalab/percona-server-mongodb-operator:PR-1536-4cc529f8") | ((.. | select(.[] == "DISABLE_TELEMETRY")) |= .value="true") | ((.. | select(.[] == "LOG_LEVEL")) |= .value="DEBUG")' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/cw-operator.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.kKV7XzXm5l ++ mktemp + local LAST_ERR=/tmp/tmp.M71LjbXwSZ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.kKV7XzXm5l deployment.apps/percona-server-mongodb-operator created + cat /tmp/tmp.M71LjbXwSZ + rm /tmp/tmp.kKV7XzXm5l /tmp/tmp.M71LjbXwSZ + return 0 + sleep 2 ++ get_operator_pod ++ kubectl_bin get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.duldwS7jxK +++ mktemp ++ local LAST_ERR=/tmp/tmp.OivRR29HwM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.duldwS7jxK ++ cat /tmp/tmp.OivRR29HwM ++ rm /tmp/tmp.duldwS7jxK /tmp/tmp.OivRR29HwM ++ return 0 + wait_pod percona-server-mongodb-operator-75c69449b4-r56mx + local pod=percona-server-mongodb-operator-75c69449b4-r56mx + set +o xtrace waiting for pod/percona-server-mongodb-operator-75c69449b4-r56mx to be ready..OK + create_namespace tls-issue-cert-manager-19787 + local namespace=tls-issue-cert-manager-19787 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + egrep -v '^kube-|^default|Terminating|psmdb-operator|openshift|gke-mcs|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces tls-issue-cert-manager-19787' + xargs kubectl delete ns + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces tls-issue-cert-manager-19787 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace tls-issue-cert-manager-19787 --ignore-not-found + kubectl_bin get ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.6Tyj8L2H0g + local LAST_OUT=/tmp/tmp.ohKuJVsIX8 ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.QE57NsVJjg + local exit_status=0 + local timeout=4 + local LAST_ERR=/tmp/tmp.ObiFZPCdl6 + local exit_status=0 + local timeout=4 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + for i in '$(seq 0 2)' + set +e + kubectl delete namespace tls-issue-cert-manager-19787 --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.6Tyj8L2H0g + cat /tmp/tmp.QE57NsVJjg + rm /tmp/tmp.6Tyj8L2H0g /tmp/tmp.QE57NsVJjg + return 0 error: resource(s) were provided, but no name was specified + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ohKuJVsIX8 + cat /tmp/tmp.ObiFZPCdl6 + rm /tmp/tmp.ohKuJVsIX8 /tmp/tmp.ObiFZPCdl6 + return 0 + kubectl_bin wait --for=delete namespace tls-issue-cert-manager-19787 ++ mktemp + local LAST_OUT=/tmp/tmp.P5etvUPmhT ++ mktemp + local LAST_ERR=/tmp/tmp.KCYwPEQLv9 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete namespace tls-issue-cert-manager-19787 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.P5etvUPmhT + cat /tmp/tmp.KCYwPEQLv9 + rm /tmp/tmp.P5etvUPmhT /tmp/tmp.KCYwPEQLv9 + return 0 + desc 'create namespace tls-issue-cert-manager-19787' + set +o xtrace ----------------------------------------------------------------------------------- create namespace tls-issue-cert-manager-19787 ----------------------------------------------------------------------------------- + kubectl_bin create namespace tls-issue-cert-manager-19787 ++ mktemp + local LAST_OUT=/tmp/tmp.SASBnyKGZC ++ mktemp + local LAST_ERR=/tmp/tmp.xIzJj2jMy2 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace tls-issue-cert-manager-19787 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.SASBnyKGZC namespace/tls-issue-cert-manager-19787 created + cat /tmp/tmp.xIzJj2jMy2 + rm /tmp/tmp.SASBnyKGZC /tmp/tmp.xIzJj2jMy2 + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.rlza5pOni4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.nCNQ2IU6PA ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.rlza5pOni4 ++ cat /tmp/tmp.nCNQ2IU6PA ++ rm /tmp/tmp.rlza5pOni4 /tmp/tmp.nCNQ2IU6PA ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1536-4cc529f8-11-cluster4 --namespace=tls-issue-cert-manager-19787 ++ mktemp + local LAST_OUT=/tmp/tmp.VeN0qdGbUK ++ mktemp + local LAST_ERR=/tmp/tmp.l9FvCdOEkN + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1536-4cc529f8-11-cluster4 --namespace=tls-issue-cert-manager-19787 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.VeN0qdGbUK Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-1536-4cc529f8-11-cluster4" modified. + cat /tmp/tmp.l9FvCdOEkN + rm /tmp/tmp.VeN0qdGbUK /tmp/tmp.l9FvCdOEkN + return 0 + deploy_cert_manager + desc 'deploy cert manager' + set +o xtrace ----------------------------------------------------------------------------------- deploy cert manager ----------------------------------------------------------------------------------- + kubectl_bin create namespace cert-manager ++ mktemp + local LAST_OUT=/tmp/tmp.657pB2h5JT ++ mktemp + local LAST_ERR=/tmp/tmp.HeULAYyRYv + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace cert-manager + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.657pB2h5JT namespace/cert-manager created + cat /tmp/tmp.HeULAYyRYv + rm /tmp/tmp.657pB2h5JT /tmp/tmp.HeULAYyRYv + return 0 + kubectl_bin label namespace cert-manager certmanager.k8s.io/disable-validation=true ++ mktemp + local LAST_OUT=/tmp/tmp.bWXQ04R04N ++ mktemp + local LAST_ERR=/tmp/tmp.vVyEXEzDXc + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl label namespace cert-manager certmanager.k8s.io/disable-validation=true + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.bWXQ04R04N namespace/cert-manager labeled + cat /tmp/tmp.vVyEXEzDXc + rm /tmp/tmp.bWXQ04R04N /tmp/tmp.vVyEXEzDXc + return 0 + kubectl_bin apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.12.4/cert-manager.yaml --validate=false ++ mktemp + local LAST_OUT=/tmp/tmp.KL986N10li ++ mktemp + local LAST_ERR=/tmp/tmp.BC3aalhtqj + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.12.4/cert-manager.yaml --validate=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.KL986N10li namespace/cert-manager configured customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io unchanged serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager created serviceaccount/cert-manager-webhook created configmap/cert-manager-webhook created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-edit unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews configured role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection configured rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created service/cert-manager created service/cert-manager-webhook created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager created deployment.apps/cert-manager-webhook created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured + cat /tmp/tmp.BC3aalhtqj Warning: resource namespaces/cert-manager is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. + rm /tmp/tmp.KL986N10li /tmp/tmp.BC3aalhtqj + return 0 + kubectl_bin -n cert-manager wait pod -l app.kubernetes.io/instance=cert-manager --for=condition=ready ++ mktemp + local LAST_OUT=/tmp/tmp.xkmXkE0YLA ++ mktemp + local LAST_ERR=/tmp/tmp.XpQIuwtZgw + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n cert-manager wait pod -l app.kubernetes.io/instance=cert-manager --for=condition=ready + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xkmXkE0YLA pod/cert-manager-6b8456bfd4-vgzzh condition met pod/cert-manager-cainjector-79495bdbc8-q8r46 condition met pod/cert-manager-webhook-56fc7669b6-9kbdd condition met + cat /tmp/tmp.XpQIuwtZgw + rm /tmp/tmp.xkmXkE0YLA /tmp/tmp.XpQIuwtZgw + return 0 + sleep 120 + desc 'create secrets and start client' + set +o xtrace ----------------------------------------------------------------------------------- create secrets and start client ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/conf/secrets.yml ++ mktemp + local LAST_OUT=/tmp/tmp.tBTMDztZn9 ++ mktemp + local LAST_ERR=/tmp/tmp.3DvuFSUJah + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/conf/secrets.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.tBTMDztZn9 secret/some-users created + cat /tmp/tmp.3DvuFSUJah + rm /tmp/tmp.tBTMDztZn9 /tmp/tmp.3DvuFSUJah + return 0 + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/conf/client_with_tls.yml ++ mktemp + local LAST_OUT=/tmp/tmp.47u5HPt5ua ++ mktemp + local LAST_ERR=/tmp/tmp.Kh3e8QLbLF + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/conf/client_with_tls.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.47u5HPt5ua deployment.apps/psmdb-client created + cat /tmp/tmp.Kh3e8QLbLF + rm /tmp/tmp.47u5HPt5ua /tmp/tmp.Kh3e8QLbLF + return 0 + deploy_cmctl + local service_account=cmctl + /usr/bin/sed -e s/percona-server-mongodb-operator/cmctl/g /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/rbac.yaml + yq '(select(.rules).rules[] | select(contains({"apiGroups": ["cert-manager.io"]}))).resources += "certificates/status"' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.SO90tuCx5g ++ mktemp + local LAST_ERR=/tmp/tmp.xBFxxyzhRG + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.SO90tuCx5g role.rbac.authorization.k8s.io/cmctl created serviceaccount/cmctl created rolebinding.rbac.authorization.k8s.io/service-account-cmctl created + cat /tmp/tmp.xBFxxyzhRG + rm /tmp/tmp.SO90tuCx5g /tmp/tmp.xBFxxyzhRG + return 0 + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/conf/cmctl.yml ++ mktemp + local LAST_OUT=/tmp/tmp.3yFCEpqxxs ++ mktemp + local LAST_ERR=/tmp/tmp.1oGtbDXAbu + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/conf/cmctl.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.3yFCEpqxxs deployment.apps/cmctl created + cat /tmp/tmp.1oGtbDXAbu + rm /tmp/tmp.3yFCEpqxxs /tmp/tmp.1oGtbDXAbu + return 0 + cluster=some-name + desc 'create first PSMDB cluster some-name' + set +o xtrace ----------------------------------------------------------------------------------- create first PSMDB cluster some-name ----------------------------------------------------------------------------------- + apply_cluster /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/conf/some-name.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/conf/some-name.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/conf/some-name.yml + yq eval '(.spec | select(.image == null)).image = "perconalab/percona-server-mongodb-operator:main-mongod7.0"' ++ mktemp + yq eval '.spec.upgradeOptions.apply="Never"' + yq eval '(.spec | select(has("backup"))).backup.image = "perconalab/percona-server-mongodb-operator:main-backup"' + local LAST_OUT=/tmp/tmp.jSzyzNxTd7 + yq eval '(.spec | select(has("pmm"))).pmm.image = "perconalab/pmm-client:dev-latest"' ++ mktemp + local LAST_ERR=/tmp/tmp.pp8CcZBNki + local exit_status=0 + local timeout=4 ++ seq 0 2 + yq eval '(.spec | select(has("initImage"))).initImage = "perconalab/percona-server-mongodb-operator:PR-1536-4cc529f8"' + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.jSzyzNxTd7 perconaservermongodb.psmdb.percona.com/some-name created + cat /tmp/tmp.pp8CcZBNki + rm /tmp/tmp.jSzyzNxTd7 /tmp/tmp.pp8CcZBNki + return 0 + desc 'check if all Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all Pods started ----------------------------------------------------------------------------------- + wait_for_running some-name-rs0 3 + local name=some-name-rs0 + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=rs0 + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-rs0-0 + local pod=some-name-rs0-0 + set +o xtrace waiting for pod/some-name-rs0-0 to be ready.................OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-rs0-1 + local pod=some-name-rs0-1 + set +o xtrace waiting for pod/some-name-rs0-1 to be ready....................OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QLCG20iFMX +++ mktemp ++ local LAST_ERR=/tmp/tmp.T7rR15BlmT ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.QLCG20iFMX ++ cat /tmp/tmp.T7rR15BlmT ++ rm /tmp/tmp.QLCG20iFMX /tmp/tmp.T7rR15BlmT ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-rs0-2 + local pod=some-name-rs0-2 + set +o xtrace waiting for pod/some-name-rs0-2 to be ready...................OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DJe6j3oWnh +++ mktemp ++ local LAST_ERR=/tmp/tmp.qv4gX3RGk0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.DJe6j3oWnh ++ cat /tmp/tmp.qv4gX3RGk0 ++ rm /tmp/tmp.DJe6j3oWnh /tmp/tmp.qv4gX3RGk0 ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness........................... + wait_for_running some-name-cfg 3 false + local name=some-name-cfg + let last_pod=2 + local check_cluster_readyness=false + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=cfg + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-cfg-0 + local pod=some-name-cfg-0 + set +o xtrace waiting for pod/some-name-cfg-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-cfg-1 + local pod=some-name-cfg-1 + set +o xtrace waiting for pod/some-name-cfg-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nnGrF7Sv8u +++ mktemp ++ local LAST_ERR=/tmp/tmp.KRxeXaVSNF ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.nnGrF7Sv8u ++ cat /tmp/tmp.KRxeXaVSNF ++ rm /tmp/tmp.nnGrF7Sv8u /tmp/tmp.KRxeXaVSNF ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-cfg-2 + local pod=some-name-cfg-2 + set +o xtrace waiting for pod/some-name-cfg-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.M8xl6Id09R +++ mktemp ++ local LAST_ERR=/tmp/tmp.svNmjB72cc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.M8xl6Id09R ++ cat /tmp/tmp.svNmjB72cc ++ rm /tmp/tmp.M8xl6Id09R /tmp/tmp.svNmjB72cc ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ false == \t\r\u\e ]] + wait_for_running some-name-mongos 3 + local name=some-name-mongos + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=mongos + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-mongos-0 + local pod=some-name-mongos-0 + set +o xtrace waiting for pod/some-name-mongos-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-mongos-1 + local pod=some-name-mongos-1 + set +o xtrace waiting for pod/some-name-mongos-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BMdqKs8Xec +++ mktemp ++ local LAST_ERR=/tmp/tmp.KWhVaZU2gk ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.BMdqKs8Xec ++ cat /tmp/tmp.KWhVaZU2gk ++ rm /tmp/tmp.BMdqKs8Xec /tmp/tmp.KWhVaZU2gk ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-mongos-2 + local pod=some-name-mongos-2 + set +o xtrace waiting for pod/some-name-mongos-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.502oqB6M49 +++ mktemp ++ local LAST_ERR=/tmp/tmp.1DjXOSZmF9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.502oqB6M49 ++ cat /tmp/tmp.1DjXOSZmF9 ++ rm /tmp/tmp.502oqB6M49 /tmp/tmp.1DjXOSZmF9 ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness + compare_kubectl statefulset/some-name-rs0 + local resource=statefulset/some-name-rs0 + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-rs0.yml + local new_result=/tmp/tmp.aSxxw5JDFg/statefulset_some-name-rs0.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-rs0-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-rs0 + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | ++ mktemp (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.6DxpNADynV ++ mktemp + local LAST_ERR=/tmp/tmp.P9KG6Pofqt + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-rs0 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.6DxpNADynV + cat /tmp/tmp.P9KG6Pofqt + rm /tmp/tmp.6DxpNADynV /tmp/tmp.P9KG6Pofqt + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-rs0.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-rs0.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-rs0.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-rs0.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-rs0.yml /tmp/tmp.aSxxw5JDFg/statefulset_some-name-rs0.yml + compare_kubectl statefulset/some-name-cfg + local resource=statefulset/some-name-cfg + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-cfg.yml + local new_result=/tmp/tmp.aSxxw5JDFg/statefulset_some-name-cfg.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-cfg-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-cfg ++ mktemp + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.TxljCir7KI ++ mktemp + local LAST_ERR=/tmp/tmp.TMeX5ek5I3 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-cfg + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.TxljCir7KI + cat /tmp/tmp.TMeX5ek5I3 + rm /tmp/tmp.TxljCir7KI /tmp/tmp.TMeX5ek5I3 + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-cfg.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-cfg.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-cfg.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-cfg.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-cfg.yml /tmp/tmp.aSxxw5JDFg/statefulset_some-name-cfg.yml + compare_kubectl statefulset/some-name-mongos + local resource=statefulset/some-name-mongos + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-mongos.yml + local new_result=/tmp/tmp.aSxxw5JDFg/statefulset_some-name-mongos.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-mongos-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-mongos + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.UEwJVxMEzM ++ mktemp + local LAST_ERR=/tmp/tmp.x2vWdm5xNv + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.UEwJVxMEzM + cat /tmp/tmp.x2vWdm5xNv + rm /tmp/tmp.UEwJVxMEzM /tmp/tmp.x2vWdm5xNv + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-mongos.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-mongos.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-mongos.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-mongos.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-mongos.yml /tmp/tmp.aSxxw5JDFg/statefulset_some-name-mongos.yml + desc 'check if certificates issued with certmanager' + set +o xtrace ----------------------------------------------------------------------------------- check if certificates issued with certmanager ----------------------------------------------------------------------------------- + check_tls_secret some-name-ssl + local secret_name=some-name-ssl + check_secret_data_key some-name-ssl ca.crt + local secret_name=some-name-ssl + local data_key=ca.crt + local secret_data ++ kubectl_bin get secrets/some-name-ssl -o json ++ jq '.data["ca.crt"]' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SNqc8Pu5l3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.xKdX5YQV47 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.SNqc8Pu5l3 ++ cat /tmp/tmp.xKdX5YQV47 ++ rm /tmp/tmp.SNqc8Pu5l3 /tmp/tmp.xKdX5YQV47 ++ return 0 + secret_data='"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"' + '[' -z '"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"' ']' + check_secret_data_key some-name-ssl tls.crt + local secret_name=some-name-ssl + local data_key=tls.crt + local secret_data ++ kubectl_bin get secrets/some-name-ssl -o json ++ jq '.data["tls.crt"]' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ELaKNndQR4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.k5of4qEK1m ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ELaKNndQR4 ++ cat /tmp/tmp.k5of4qEK1m ++ rm /tmp/tmp.ELaKNndQR4 /tmp/tmp.k5of4qEK1m ++ return 0 + secret_data='"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"' + '[' -z '"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"' ']' + check_secret_data_key some-name-ssl tls.key + local secret_name=some-name-ssl + local data_key=tls.key + local secret_data ++ kubectl_bin get secrets/some-name-ssl -o json ++ jq '.data["tls.key"]' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dufHsueQjz +++ mktemp ++ local LAST_ERR=/tmp/tmp.XhkQtCPzuD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/some-name-ssl -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.dufHsueQjz ++ cat /tmp/tmp.XhkQtCPzuD ++ rm /tmp/tmp.dufHsueQjz /tmp/tmp.XhkQtCPzuD ++ return 0 + secret_data='"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"' + '[' -z '"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"' ']' + desc 'check if CA issuer created' + set +o xtrace ----------------------------------------------------------------------------------- check if CA issuer created ----------------------------------------------------------------------------------- + compare_kubectl issuer/some-name-psmdb-ca-issuer + local resource=issuer/some-name-psmdb-ca-issuer + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-ca-issuer.yml + local new_result=/tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-ca-issuer.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-ca-issuer-oc.yml ']' + kubectl_bin get -o yaml issuer/some-name-psmdb-ca-issuer ++ mktemp + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.pdfNe0AOGe ++ mktemp + local LAST_ERR=/tmp/tmp.cYarngHpbo + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml issuer/some-name-psmdb-ca-issuer + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.pdfNe0AOGe + cat /tmp/tmp.cYarngHpbo + rm /tmp/tmp.pdfNe0AOGe /tmp/tmp.cYarngHpbo + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-ca-issuer.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-ca-issuer.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-ca-issuer.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-ca-issuer.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-ca-issuer.yml /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-ca-issuer.yml + desc 'check if issuer created' + set +o xtrace ----------------------------------------------------------------------------------- check if issuer created ----------------------------------------------------------------------------------- + compare_kubectl issuer/some-name-psmdb-issuer + local resource=issuer/some-name-psmdb-issuer + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-issuer.yml + local new_result=/tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-issuer.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-issuer-oc.yml ']' + kubectl_bin get -o yaml issuer/some-name-psmdb-issuer + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.HFey5v0frv ++ mktemp + local LAST_ERR=/tmp/tmp.Eik1pzjQqg + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml issuer/some-name-psmdb-issuer + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.HFey5v0frv + cat /tmp/tmp.Eik1pzjQqg + rm /tmp/tmp.HFey5v0frv /tmp/tmp.Eik1pzjQqg + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-issuer.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-issuer.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-issuer.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-issuer.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-issuer.yml /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-issuer.yml + desc 'check if certificate issued' + set +o xtrace ----------------------------------------------------------------------------------- check if certificate issued ----------------------------------------------------------------------------------- + compare_kubectl certificate/some-name-ssl + local resource=certificate/some-name-ssl + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl.yml + local new_result=/tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl-oc.yml ']' + kubectl_bin get -o yaml certificate/some-name-ssl + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.Cf50P6sGGB ++ mktemp + local LAST_ERR=/tmp/tmp.rzna3PCWjE + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml certificate/some-name-ssl + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Cf50P6sGGB + cat /tmp/tmp.rzna3PCWjE + rm /tmp/tmp.Cf50P6sGGB /tmp/tmp.rzna3PCWjE + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl.yml /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl.yml + desc 'check if internal certificate issued' + set +o xtrace ----------------------------------------------------------------------------------- check if internal certificate issued ----------------------------------------------------------------------------------- + compare_kubectl certificate/some-name-ssl-internal + local resource=certificate/some-name-ssl-internal + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl-internal.yml + local new_result=/tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl-internal.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl-internal-oc.yml ']' + kubectl_bin get -o yaml certificate/some-name-ssl-internal ++ mktemp + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.qWSmxuHG9D ++ mktemp + local LAST_ERR=/tmp/tmp.ayKedx6k9W + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml certificate/some-name-ssl-internal + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.qWSmxuHG9D + cat /tmp/tmp.ayKedx6k9W + rm /tmp/tmp.qWSmxuHG9D /tmp/tmp.ayKedx6k9W + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl-internal.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl-internal.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl-internal.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl-internal.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl-internal.yml /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl-internal.yml + renew_certificate some-name-ssl + certificate=some-name-ssl + wait_certificate some-name-ssl + certificate=some-name-ssl + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl --timeout=60s certificate.cert-manager.io/some-name-ssl condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl --timeout=60s certificate.cert-manager.io/some-name-ssl condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl --timeout=60s certificate.cert-manager.io/some-name-ssl condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl --timeout=60s certificate.cert-manager.io/some-name-ssl condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl --timeout=60s certificate.cert-manager.io/some-name-ssl condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl --timeout=60s certificate.cert-manager.io/some-name-ssl condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl --timeout=60s certificate.cert-manager.io/some-name-ssl condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl --timeout=60s certificate.cert-manager.io/some-name-ssl condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl --timeout=60s certificate.cert-manager.io/some-name-ssl condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl --timeout=60s certificate.cert-manager.io/some-name-ssl condition met + sleep 1 + desc 'renew some-name-ssl' + set +o xtrace ----------------------------------------------------------------------------------- renew some-name-ssl ----------------------------------------------------------------------------------- + local pod_name ++ kubectl_bin get pods --selector=name=cmctl -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LTtupv2kpG +++ mktemp ++ local LAST_ERR=/tmp/tmp.qxUFtF9iI1 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=cmctl -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.LTtupv2kpG ++ cat /tmp/tmp.qxUFtF9iI1 ++ rm /tmp/tmp.LTtupv2kpG /tmp/tmp.qxUFtF9iI1 ++ return 0 + pod_name=cmctl-69659bcd68-2dxfg + local revision ++ kubectl_bin get certificate some-name-ssl -o 'jsonpath={.status.revision}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jZ7aASOQV8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.3eZcAZ7WHz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get certificate some-name-ssl -o 'jsonpath={.status.revision}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.jZ7aASOQV8 ++ cat /tmp/tmp.3eZcAZ7WHz ++ rm /tmp/tmp.jZ7aASOQV8 /tmp/tmp.3eZcAZ7WHz ++ return 0 + revision=1 + kubectl_bin exec cmctl-69659bcd68-2dxfg -- /tmp/cmctl renew some-name-ssl ++ mktemp + local LAST_OUT=/tmp/tmp.ysmAwJYYQH ++ mktemp + local LAST_ERR=/tmp/tmp.lcLCiutzvB + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec cmctl-69659bcd68-2dxfg -- /tmp/cmctl renew some-name-ssl + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ysmAwJYYQH Manually triggered issuance of Certificate tls-issue-cert-manager-19787/some-name-ssl + cat /tmp/tmp.lcLCiutzvB + rm /tmp/tmp.ysmAwJYYQH /tmp/tmp.lcLCiutzvB + return 0 + for i in '{1..10}' + local new_revision ++ kubectl_bin get certificate some-name-ssl -o 'jsonpath={.status.revision}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BMgjhidJzT +++ mktemp ++ local LAST_ERR=/tmp/tmp.dNuFqL9iUc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get certificate some-name-ssl -o 'jsonpath={.status.revision}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.BMgjhidJzT ++ cat /tmp/tmp.dNuFqL9iUc ++ rm /tmp/tmp.BMgjhidJzT /tmp/tmp.dNuFqL9iUc ++ return 0 + new_revision=1 + '[' 2 == 1 ']' + sleep 1 + for i in '{1..10}' + local new_revision ++ kubectl_bin get certificate some-name-ssl -o 'jsonpath={.status.revision}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.80LYoBhHhV +++ mktemp ++ local LAST_ERR=/tmp/tmp.2xQY8GnrZg ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get certificate some-name-ssl -o 'jsonpath={.status.revision}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.80LYoBhHhV ++ cat /tmp/tmp.2xQY8GnrZg ++ rm /tmp/tmp.80LYoBhHhV /tmp/tmp.2xQY8GnrZg ++ return 0 + new_revision=2 + '[' 2 == 2 ']' + break + sleep 10 + wait_for_running some-name-rs0 3 + local name=some-name-rs0 + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=rs0 + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-rs0-0 + local pod=some-name-rs0-0 + set +o xtrace waiting for pod/some-name-rs0-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-rs0-1 + local pod=some-name-rs0-1 + set +o xtrace waiting for pod/some-name-rs0-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QDuNj3i549 +++ mktemp ++ local LAST_ERR=/tmp/tmp.RcjzvoQoXW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.QDuNj3i549 ++ cat /tmp/tmp.RcjzvoQoXW ++ rm /tmp/tmp.QDuNj3i549 /tmp/tmp.RcjzvoQoXW ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-rs0-2 + local pod=some-name-rs0-2 + set +o xtrace waiting for pod/some-name-rs0-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tFrLoBdwMp +++ mktemp ++ local LAST_ERR=/tmp/tmp.0gNiisb6dS ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.tFrLoBdwMp ++ cat /tmp/tmp.0gNiisb6dS ++ rm /tmp/tmp.tFrLoBdwMp /tmp/tmp.0gNiisb6dS ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness.................................................................................................................................................................................................................. + wait_for_running some-name-cfg 3 false + local name=some-name-cfg + let last_pod=2 + local check_cluster_readyness=false + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=cfg + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-cfg-0 + local pod=some-name-cfg-0 + set +o xtrace waiting for pod/some-name-cfg-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-cfg-1 + local pod=some-name-cfg-1 + set +o xtrace waiting for pod/some-name-cfg-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vW8XA5Ie8T +++ mktemp ++ local LAST_ERR=/tmp/tmp.7wJthApGKr ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vW8XA5Ie8T ++ cat /tmp/tmp.7wJthApGKr ++ rm /tmp/tmp.vW8XA5Ie8T /tmp/tmp.7wJthApGKr ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-cfg-2 + local pod=some-name-cfg-2 + set +o xtrace waiting for pod/some-name-cfg-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ceW9O8u1Pn +++ mktemp ++ local LAST_ERR=/tmp/tmp.7lyX7y4sHT ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ceW9O8u1Pn ++ cat /tmp/tmp.7lyX7y4sHT ++ rm /tmp/tmp.ceW9O8u1Pn /tmp/tmp.7lyX7y4sHT ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ false == \t\r\u\e ]] + wait_for_running some-name-mongos 3 + local name=some-name-mongos + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=mongos + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-mongos-0 + local pod=some-name-mongos-0 + set +o xtrace waiting for pod/some-name-mongos-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-mongos-1 + local pod=some-name-mongos-1 + set +o xtrace waiting for pod/some-name-mongos-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EgcmsWDpDY +++ mktemp ++ local LAST_ERR=/tmp/tmp.TnAdTQUtm6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.EgcmsWDpDY ++ cat /tmp/tmp.TnAdTQUtm6 ++ rm /tmp/tmp.EgcmsWDpDY /tmp/tmp.TnAdTQUtm6 ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-mongos-2 + local pod=some-name-mongos-2 + set +o xtrace waiting for pod/some-name-mongos-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4LeKff1m35 +++ mktemp ++ local LAST_ERR=/tmp/tmp.qPnRzdSP16 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.4LeKff1m35 ++ cat /tmp/tmp.qPnRzdSP16 ++ rm /tmp/tmp.4LeKff1m35 /tmp/tmp.qPnRzdSP16 ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness + renew_certificate some-name-ssl-internal + certificate=some-name-ssl-internal + wait_certificate some-name-ssl-internal + certificate=some-name-ssl-internal + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl-internal --timeout=60s certificate.cert-manager.io/some-name-ssl-internal condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl-internal --timeout=60s certificate.cert-manager.io/some-name-ssl-internal condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl-internal --timeout=60s certificate.cert-manager.io/some-name-ssl-internal condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl-internal --timeout=60s certificate.cert-manager.io/some-name-ssl-internal condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl-internal --timeout=60s certificate.cert-manager.io/some-name-ssl-internal condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl-internal --timeout=60s certificate.cert-manager.io/some-name-ssl-internal condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl-internal --timeout=60s certificate.cert-manager.io/some-name-ssl-internal condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl-internal --timeout=60s certificate.cert-manager.io/some-name-ssl-internal condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl-internal --timeout=60s certificate.cert-manager.io/some-name-ssl-internal condition met + sleep 1 + for i in '{1..10}' + kubectl wait --for=condition=Ready certificate/some-name-ssl-internal --timeout=60s certificate.cert-manager.io/some-name-ssl-internal condition met + sleep 1 + desc 'renew some-name-ssl-internal' + set +o xtrace ----------------------------------------------------------------------------------- renew some-name-ssl-internal ----------------------------------------------------------------------------------- + local pod_name ++ kubectl_bin get pods --selector=name=cmctl -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.T1ebJ4DZVO +++ mktemp ++ local LAST_ERR=/tmp/tmp.fHlZuEIU8W ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=cmctl -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.T1ebJ4DZVO ++ cat /tmp/tmp.fHlZuEIU8W ++ rm /tmp/tmp.T1ebJ4DZVO /tmp/tmp.fHlZuEIU8W ++ return 0 + pod_name=cmctl-69659bcd68-2dxfg + local revision ++ kubectl_bin get certificate some-name-ssl-internal -o 'jsonpath={.status.revision}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.AWeiEvnoNB +++ mktemp ++ local LAST_ERR=/tmp/tmp.J2jIGLluwa ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get certificate some-name-ssl-internal -o 'jsonpath={.status.revision}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.AWeiEvnoNB ++ cat /tmp/tmp.J2jIGLluwa ++ rm /tmp/tmp.AWeiEvnoNB /tmp/tmp.J2jIGLluwa ++ return 0 + revision=1 + kubectl_bin exec cmctl-69659bcd68-2dxfg -- /tmp/cmctl renew some-name-ssl-internal ++ mktemp + local LAST_OUT=/tmp/tmp.D1C6WluibM ++ mktemp + local LAST_ERR=/tmp/tmp.0DlPSwAIeM + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec cmctl-69659bcd68-2dxfg -- /tmp/cmctl renew some-name-ssl-internal + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.D1C6WluibM Manually triggered issuance of Certificate tls-issue-cert-manager-19787/some-name-ssl-internal + cat /tmp/tmp.0DlPSwAIeM + rm /tmp/tmp.D1C6WluibM /tmp/tmp.0DlPSwAIeM + return 0 + for i in '{1..10}' + local new_revision ++ kubectl_bin get certificate some-name-ssl-internal -o 'jsonpath={.status.revision}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.iSrMIYzPur +++ mktemp ++ local LAST_ERR=/tmp/tmp.FworKwCvx6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get certificate some-name-ssl-internal -o 'jsonpath={.status.revision}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.iSrMIYzPur ++ cat /tmp/tmp.FworKwCvx6 ++ rm /tmp/tmp.iSrMIYzPur /tmp/tmp.FworKwCvx6 ++ return 0 + new_revision=2 + '[' 2 == 2 ']' + break + sleep 10 + wait_for_running some-name-rs0 3 + local name=some-name-rs0 + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=rs0 + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-rs0-0 + local pod=some-name-rs0-0 + set +o xtrace waiting for pod/some-name-rs0-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-rs0-1 + local pod=some-name-rs0-1 + set +o xtrace waiting for pod/some-name-rs0-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.f4vVF0qhew +++ mktemp ++ local LAST_ERR=/tmp/tmp.q5ImULwXAG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.f4vVF0qhew ++ cat /tmp/tmp.q5ImULwXAG ++ rm /tmp/tmp.f4vVF0qhew /tmp/tmp.q5ImULwXAG ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-rs0-2 + local pod=some-name-rs0-2 + set +o xtrace waiting for pod/some-name-rs0-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.m7vCU69aDP +++ mktemp ++ local LAST_ERR=/tmp/tmp.W8ChuczE8d ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.m7vCU69aDP ++ cat /tmp/tmp.W8ChuczE8d ++ rm /tmp/tmp.m7vCU69aDP /tmp/tmp.W8ChuczE8d ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness.................................................................................................................................................................................................................... + wait_for_running some-name-cfg 3 false + local name=some-name-cfg + let last_pod=2 + local check_cluster_readyness=false + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=cfg + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-cfg-0 + local pod=some-name-cfg-0 + set +o xtrace waiting for pod/some-name-cfg-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-cfg-1 + local pod=some-name-cfg-1 + set +o xtrace waiting for pod/some-name-cfg-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.w4YIny6MYV +++ mktemp ++ local LAST_ERR=/tmp/tmp.Shs1lyoGZR ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.w4YIny6MYV ++ cat /tmp/tmp.Shs1lyoGZR ++ rm /tmp/tmp.w4YIny6MYV /tmp/tmp.Shs1lyoGZR ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-cfg-2 + local pod=some-name-cfg-2 + set +o xtrace waiting for pod/some-name-cfg-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GxkJei87rn +++ mktemp ++ local LAST_ERR=/tmp/tmp.1cpUDXehX6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.GxkJei87rn ++ cat /tmp/tmp.1cpUDXehX6 ++ rm /tmp/tmp.GxkJei87rn /tmp/tmp.1cpUDXehX6 ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ false == \t\r\u\e ]] + wait_for_running some-name-mongos 3 + local name=some-name-mongos + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=mongos + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-mongos-0 + local pod=some-name-mongos-0 + set +o xtrace waiting for pod/some-name-mongos-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-mongos-1 + local pod=some-name-mongos-1 + set +o xtrace waiting for pod/some-name-mongos-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YbOzAeqnAO +++ mktemp ++ local LAST_ERR=/tmp/tmp.SVX4TKNz7d ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.YbOzAeqnAO ++ cat /tmp/tmp.SVX4TKNz7d ++ rm /tmp/tmp.YbOzAeqnAO /tmp/tmp.SVX4TKNz7d ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-mongos-2 + local pod=some-name-mongos-2 + set +o xtrace waiting for pod/some-name-mongos-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Ak8WVkaPv9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.LCQpzKq5sg ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Ak8WVkaPv9 ++ cat /tmp/tmp.LCQpzKq5sg ++ rm /tmp/tmp.Ak8WVkaPv9 /tmp/tmp.LCQpzKq5sg ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness + desc 'check if CA issuer created' + set +o xtrace ----------------------------------------------------------------------------------- check if CA issuer created ----------------------------------------------------------------------------------- + compare_kubectl issuer/some-name-psmdb-ca-issuer + local resource=issuer/some-name-psmdb-ca-issuer + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-ca-issuer.yml + local new_result=/tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-ca-issuer.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-ca-issuer-oc.yml ']' + kubectl_bin get -o yaml issuer/some-name-psmdb-ca-issuer + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.33pfn8pPFy ++ mktemp + local LAST_ERR=/tmp/tmp.jM7lCKqCkr + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml issuer/some-name-psmdb-ca-issuer + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.33pfn8pPFy + cat /tmp/tmp.jM7lCKqCkr + rm /tmp/tmp.33pfn8pPFy /tmp/tmp.jM7lCKqCkr + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-ca-issuer.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-ca-issuer.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-ca-issuer.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-ca-issuer.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-ca-issuer.yml /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-ca-issuer.yml + desc 'check if issuer created' + set +o xtrace ----------------------------------------------------------------------------------- check if issuer created ----------------------------------------------------------------------------------- + compare_kubectl issuer/some-name-psmdb-issuer + local resource=issuer/some-name-psmdb-issuer + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-issuer.yml + local new_result=/tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-issuer.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-issuer-oc.yml ']' + kubectl_bin get -o yaml issuer/some-name-psmdb-issuer ++ mktemp + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.jk49vmGvps ++ mktemp + local LAST_ERR=/tmp/tmp.TjZtfOz2sU + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml issuer/some-name-psmdb-issuer + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.jk49vmGvps + cat /tmp/tmp.TjZtfOz2sU + rm /tmp/tmp.jk49vmGvps /tmp/tmp.TjZtfOz2sU + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-issuer.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-issuer.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-issuer.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-issuer.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/issuer_some-name-psmdb-issuer.yml /tmp/tmp.aSxxw5JDFg/issuer_some-name-psmdb-issuer.yml + desc 'check if certificate issued' + set +o xtrace ----------------------------------------------------------------------------------- check if certificate issued ----------------------------------------------------------------------------------- + compare_kubectl certificate/some-name-ssl + local resource=certificate/some-name-ssl + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl.yml + local new_result=/tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl-oc.yml ']' + kubectl_bin get -o yaml certificate/some-name-ssl ++ mktemp + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.uxGWWBoSyo ++ mktemp + local LAST_ERR=/tmp/tmp.dcqUUnj4qC + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml certificate/some-name-ssl + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.uxGWWBoSyo + cat /tmp/tmp.dcqUUnj4qC + rm /tmp/tmp.uxGWWBoSyo /tmp/tmp.dcqUUnj4qC + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl.yml /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl.yml + desc 'check if internal certificate issued' + set +o xtrace ----------------------------------------------------------------------------------- check if internal certificate issued ----------------------------------------------------------------------------------- + compare_kubectl certificate/some-name-ssl-internal + local resource=certificate/some-name-ssl-internal + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl-internal.yml + local new_result=/tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl-internal.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl-internal-oc.yml ']' + kubectl_bin get -o yaml certificate/some-name-ssl-internal + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.c8mMX2NOh3 ++ mktemp + local LAST_ERR=/tmp/tmp.7mXLsIwSJV + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml certificate/some-name-ssl-internal + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.c8mMX2NOh3 + cat /tmp/tmp.7mXLsIwSJV + rm /tmp/tmp.c8mMX2NOh3 /tmp/tmp.7mXLsIwSJV + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl-internal.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl-internal.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl-internal.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl-internal.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/certificate_some-name-ssl-internal.yml /tmp/tmp.aSxxw5JDFg/certificate_some-name-ssl-internal.yml + desc 'disable TLS' + set +o xtrace ----------------------------------------------------------------------------------- disable TLS ----------------------------------------------------------------------------------- + disable_tls some-name + local cluster=some-name + echo 'Disabling TLS for cluster some-name' Disabling TLS for cluster some-name + kubectl_bin patch psmdb some-name --type merge '-p={"spec": { "unsafeFlags": { "tls": true }, "tls": { "mode": "disabled" } } }' ++ mktemp + local LAST_OUT=/tmp/tmp.3aWBjK5kZ4 ++ mktemp + local LAST_ERR=/tmp/tmp.xUKh4hwPhY + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch psmdb some-name --type merge '-p={"spec": { "unsafeFlags": { "tls": true }, "tls": { "mode": "disabled" } } }' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.3aWBjK5kZ4 perconaservermongodb.psmdb.percona.com/some-name patched + cat /tmp/tmp.xUKh4hwPhY + rm /tmp/tmp.3aWBjK5kZ4 /tmp/tmp.xUKh4hwPhY + return 0 + wait_for_cluster_state some-name initializing + local cluster_name=some-name + local target_state=initializing + echo -n 'Waiting for cluster to reach initializing state' Waiting for cluster to reach initializing state+ local timeout=0 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Alot9ZCScI +++ mktemp ++ local LAST_ERR=/tmp/tmp.dnwTby8HVK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Alot9ZCScI ++ cat /tmp/tmp.dnwTby8HVK ++ rm /tmp/tmp.Alot9ZCScI /tmp/tmp.dnwTby8HVK ++ return 0 + [[ ready == initializing ]] + sleep 1 + timeout=1 + echo -n . .+ [[ 1 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mkQSRWWddm +++ mktemp ++ local LAST_ERR=/tmp/tmp.HinTiwLVGT ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.mkQSRWWddm ++ cat /tmp/tmp.HinTiwLVGT ++ rm /tmp/tmp.mkQSRWWddm /tmp/tmp.HinTiwLVGT ++ return 0 + [[ initializing == initializing ]] + echo + wait_for_cluster_state some-name ready + local cluster_name=some-name + local target_state=ready + echo -n 'Waiting for cluster to reach ready state' Waiting for cluster to reach ready state+ local timeout=0 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.IV6aUGETJO +++ mktemp ++ local LAST_ERR=/tmp/tmp.rGNjTkLrKg ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.IV6aUGETJO ++ cat /tmp/tmp.rGNjTkLrKg ++ rm /tmp/tmp.IV6aUGETJO /tmp/tmp.rGNjTkLrKg ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=1 + echo -n . .+ [[ 1 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5YyoEiJvSF +++ mktemp ++ local LAST_ERR=/tmp/tmp.i3ORcOS4uF ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.5YyoEiJvSF ++ cat /tmp/tmp.i3ORcOS4uF ++ rm /tmp/tmp.5YyoEiJvSF /tmp/tmp.i3ORcOS4uF ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=2 + echo -n . .+ [[ 2 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.k1er8c5pPA +++ mktemp ++ local LAST_ERR=/tmp/tmp.2bHfMVvoHk ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.k1er8c5pPA ++ cat /tmp/tmp.2bHfMVvoHk ++ rm /tmp/tmp.k1er8c5pPA /tmp/tmp.2bHfMVvoHk ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=3 + echo -n . .+ [[ 3 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OvshMxHLZy +++ mktemp ++ local LAST_ERR=/tmp/tmp.3ZlH0Cj7kO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OvshMxHLZy ++ cat /tmp/tmp.3ZlH0Cj7kO ++ rm /tmp/tmp.OvshMxHLZy /tmp/tmp.3ZlH0Cj7kO ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=4 + echo -n . .+ [[ 4 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.t3aZZl8bjO +++ mktemp ++ local LAST_ERR=/tmp/tmp.PyFtgrXSbk ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.t3aZZl8bjO ++ cat /tmp/tmp.PyFtgrXSbk ++ rm /tmp/tmp.t3aZZl8bjO /tmp/tmp.PyFtgrXSbk ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=5 + echo -n . .+ [[ 5 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JATi0sUoSO +++ mktemp ++ local LAST_ERR=/tmp/tmp.aEJsCJYORn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.JATi0sUoSO ++ cat /tmp/tmp.aEJsCJYORn ++ rm /tmp/tmp.JATi0sUoSO /tmp/tmp.aEJsCJYORn ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=6 + echo -n . .+ [[ 6 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BW9wwS4OdY +++ mktemp ++ local LAST_ERR=/tmp/tmp.uxORCLmMT4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.BW9wwS4OdY ++ cat /tmp/tmp.uxORCLmMT4 ++ rm /tmp/tmp.BW9wwS4OdY /tmp/tmp.uxORCLmMT4 ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=7 + echo -n . .+ [[ 7 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HO7lGhiVXH +++ mktemp ++ local LAST_ERR=/tmp/tmp.gn3yPXMn3O ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HO7lGhiVXH ++ cat /tmp/tmp.gn3yPXMn3O ++ rm /tmp/tmp.HO7lGhiVXH /tmp/tmp.gn3yPXMn3O ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=8 + echo -n . .+ [[ 8 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.77bgqqWsCS +++ mktemp ++ local LAST_ERR=/tmp/tmp.vWmZ2ciLoH ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.77bgqqWsCS ++ cat /tmp/tmp.vWmZ2ciLoH ++ rm /tmp/tmp.77bgqqWsCS /tmp/tmp.vWmZ2ciLoH ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=9 + echo -n . .+ [[ 9 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vRNGoJS5MF +++ mktemp ++ local LAST_ERR=/tmp/tmp.0LiN3Uw0YK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vRNGoJS5MF ++ cat /tmp/tmp.0LiN3Uw0YK ++ rm /tmp/tmp.vRNGoJS5MF /tmp/tmp.0LiN3Uw0YK ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=10 + echo -n . .+ [[ 10 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CARgSspLze +++ mktemp ++ local LAST_ERR=/tmp/tmp.Fi2qRSLL6m ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.CARgSspLze ++ cat /tmp/tmp.Fi2qRSLL6m ++ rm /tmp/tmp.CARgSspLze /tmp/tmp.Fi2qRSLL6m ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=11 + echo -n . .+ [[ 11 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.N3EHA58ilD +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZBAbnYfbo7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.N3EHA58ilD ++ cat /tmp/tmp.ZBAbnYfbo7 ++ rm /tmp/tmp.N3EHA58ilD /tmp/tmp.ZBAbnYfbo7 ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=12 + echo -n . .+ [[ 12 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QMyP3XpMGa +++ mktemp ++ local LAST_ERR=/tmp/tmp.6oOCiHn0OW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.QMyP3XpMGa ++ cat /tmp/tmp.6oOCiHn0OW ++ rm /tmp/tmp.QMyP3XpMGa /tmp/tmp.6oOCiHn0OW ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=13 + echo -n . .+ [[ 13 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Rhj3iB5Yb1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.oXlaQTg2Nh ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Rhj3iB5Yb1 ++ cat /tmp/tmp.oXlaQTg2Nh ++ rm /tmp/tmp.Rhj3iB5Yb1 /tmp/tmp.oXlaQTg2Nh ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=14 + echo -n . .+ [[ 14 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.g6qui0UC25 +++ mktemp ++ local LAST_ERR=/tmp/tmp.AHBRVj8Bxn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.g6qui0UC25 ++ cat /tmp/tmp.AHBRVj8Bxn ++ rm /tmp/tmp.g6qui0UC25 /tmp/tmp.AHBRVj8Bxn ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=15 + echo -n . .+ [[ 15 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8fbFblbHTl +++ mktemp ++ local LAST_ERR=/tmp/tmp.uoxLcZGQEQ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8fbFblbHTl ++ cat /tmp/tmp.uoxLcZGQEQ ++ rm /tmp/tmp.8fbFblbHTl /tmp/tmp.uoxLcZGQEQ ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=16 + echo -n . .+ [[ 16 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.05tM8oO7K5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.j2aOD3IrAx ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.05tM8oO7K5 ++ cat /tmp/tmp.j2aOD3IrAx ++ rm /tmp/tmp.05tM8oO7K5 /tmp/tmp.j2aOD3IrAx ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=17 + echo -n . .+ [[ 17 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.blcYzdPFUO +++ mktemp ++ local LAST_ERR=/tmp/tmp.qKrm1FDB63 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.blcYzdPFUO ++ cat /tmp/tmp.qKrm1FDB63 ++ rm /tmp/tmp.blcYzdPFUO /tmp/tmp.qKrm1FDB63 ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=18 + echo -n . .+ [[ 18 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fOGh6dtgdM +++ mktemp ++ local LAST_ERR=/tmp/tmp.aX6pQ4tiuX ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fOGh6dtgdM ++ cat /tmp/tmp.aX6pQ4tiuX ++ rm /tmp/tmp.fOGh6dtgdM /tmp/tmp.aX6pQ4tiuX ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=19 + echo -n . .+ [[ 19 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LCipMyztVs +++ mktemp ++ local LAST_ERR=/tmp/tmp.mIGYS9WTKP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.LCipMyztVs ++ cat /tmp/tmp.mIGYS9WTKP ++ rm /tmp/tmp.LCipMyztVs /tmp/tmp.mIGYS9WTKP ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=20 + echo -n . .+ [[ 20 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WkPEbEQml9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.wK6NbOAaKu ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.WkPEbEQml9 ++ cat /tmp/tmp.wK6NbOAaKu ++ rm /tmp/tmp.WkPEbEQml9 /tmp/tmp.wK6NbOAaKu ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=21 + echo -n . .+ [[ 21 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4ECpJAQmHw +++ mktemp ++ local LAST_ERR=/tmp/tmp.oqtSdTdkVc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.4ECpJAQmHw ++ cat /tmp/tmp.oqtSdTdkVc ++ rm /tmp/tmp.4ECpJAQmHw /tmp/tmp.oqtSdTdkVc ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=22 + echo -n . .+ [[ 22 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1zzJtgAFBY +++ mktemp ++ local LAST_ERR=/tmp/tmp.RvMUiMHXAI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.1zzJtgAFBY ++ cat /tmp/tmp.RvMUiMHXAI ++ rm /tmp/tmp.1zzJtgAFBY /tmp/tmp.RvMUiMHXAI ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=23 + echo -n . .+ [[ 23 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vmoVg0JwfU +++ mktemp ++ local LAST_ERR=/tmp/tmp.hqyJO7QT2m ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vmoVg0JwfU ++ cat /tmp/tmp.hqyJO7QT2m ++ rm /tmp/tmp.vmoVg0JwfU /tmp/tmp.hqyJO7QT2m ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=24 + echo -n . .+ [[ 24 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.U21HHcxrC6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Yp9EhTk6EB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.U21HHcxrC6 ++ cat /tmp/tmp.Yp9EhTk6EB ++ rm /tmp/tmp.U21HHcxrC6 /tmp/tmp.Yp9EhTk6EB ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=25 + echo -n . .+ [[ 25 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PxffBRQyjt +++ mktemp ++ local LAST_ERR=/tmp/tmp.FFhxJSFASj ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.PxffBRQyjt ++ cat /tmp/tmp.FFhxJSFASj ++ rm /tmp/tmp.PxffBRQyjt /tmp/tmp.FFhxJSFASj ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=26 + echo -n . .+ [[ 26 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lC51EGbgjw +++ mktemp ++ local LAST_ERR=/tmp/tmp.yinnyBLT2K ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lC51EGbgjw ++ cat /tmp/tmp.yinnyBLT2K ++ rm /tmp/tmp.lC51EGbgjw /tmp/tmp.yinnyBLT2K ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=27 + echo -n . .+ [[ 27 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.f63IKHacNP +++ mktemp ++ local LAST_ERR=/tmp/tmp.PmP2mDp7Pm ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.f63IKHacNP ++ cat /tmp/tmp.PmP2mDp7Pm ++ rm /tmp/tmp.f63IKHacNP /tmp/tmp.PmP2mDp7Pm ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=28 + echo -n . .+ [[ 28 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.crKGpaxEIe +++ mktemp ++ local LAST_ERR=/tmp/tmp.nnQpBhFgy1 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.crKGpaxEIe ++ cat /tmp/tmp.nnQpBhFgy1 ++ rm /tmp/tmp.crKGpaxEIe /tmp/tmp.nnQpBhFgy1 ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=29 + echo -n . .+ [[ 29 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cp9vUPNfWW +++ mktemp ++ local LAST_ERR=/tmp/tmp.bXmvJXHIHU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.cp9vUPNfWW ++ cat /tmp/tmp.bXmvJXHIHU ++ rm /tmp/tmp.cp9vUPNfWW /tmp/tmp.bXmvJXHIHU ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=30 + echo -n . .+ [[ 30 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jsk8V6PpUO +++ mktemp ++ local LAST_ERR=/tmp/tmp.vllTfbcNfV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.jsk8V6PpUO ++ cat /tmp/tmp.vllTfbcNfV ++ rm /tmp/tmp.jsk8V6PpUO /tmp/tmp.vllTfbcNfV ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=31 + echo -n . .+ [[ 31 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pERe8RcVcc +++ mktemp ++ local LAST_ERR=/tmp/tmp.0ARNOsJhvJ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.pERe8RcVcc ++ cat /tmp/tmp.0ARNOsJhvJ ++ rm /tmp/tmp.pERe8RcVcc /tmp/tmp.0ARNOsJhvJ ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=32 + echo -n . .+ [[ 32 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dmmZbMS25q +++ mktemp ++ local LAST_ERR=/tmp/tmp.5pQBSCXaYZ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.dmmZbMS25q ++ cat /tmp/tmp.5pQBSCXaYZ ++ rm /tmp/tmp.dmmZbMS25q /tmp/tmp.5pQBSCXaYZ ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=33 + echo -n . .+ [[ 33 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.R886rVZE0D +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZjyfTCrBk8 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.R886rVZE0D ++ cat /tmp/tmp.ZjyfTCrBk8 ++ rm /tmp/tmp.R886rVZE0D /tmp/tmp.ZjyfTCrBk8 ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=34 + echo -n . .+ [[ 34 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oETUwjzrqQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.LQ1pltoOmo ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.oETUwjzrqQ ++ cat /tmp/tmp.LQ1pltoOmo ++ rm /tmp/tmp.oETUwjzrqQ /tmp/tmp.LQ1pltoOmo ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=35 + echo -n . .+ [[ 35 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.b6fIDXB4Ri +++ mktemp ++ local LAST_ERR=/tmp/tmp.yJoH1shTrc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.b6fIDXB4Ri ++ cat /tmp/tmp.yJoH1shTrc ++ rm /tmp/tmp.b6fIDXB4Ri /tmp/tmp.yJoH1shTrc ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=36 + echo -n . .+ [[ 36 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8xOoGWCF1I +++ mktemp ++ local LAST_ERR=/tmp/tmp.X8jn27u9Ek ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8xOoGWCF1I ++ cat /tmp/tmp.X8jn27u9Ek ++ rm /tmp/tmp.8xOoGWCF1I /tmp/tmp.X8jn27u9Ek ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=37 + echo -n . .+ [[ 37 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LZR9gTIEFw +++ mktemp ++ local LAST_ERR=/tmp/tmp.eSzBF7Y1Ab ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.LZR9gTIEFw ++ cat /tmp/tmp.eSzBF7Y1Ab ++ rm /tmp/tmp.LZR9gTIEFw /tmp/tmp.eSzBF7Y1Ab ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=38 + echo -n . .+ [[ 38 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.C18n6ES6ba +++ mktemp ++ local LAST_ERR=/tmp/tmp.mffoSpk3aQ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.C18n6ES6ba ++ cat /tmp/tmp.mffoSpk3aQ ++ rm /tmp/tmp.C18n6ES6ba /tmp/tmp.mffoSpk3aQ ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=39 + echo -n . .+ [[ 39 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.18FQDKaQPe +++ mktemp ++ local LAST_ERR=/tmp/tmp.lnebGDsOAY ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.18FQDKaQPe ++ cat /tmp/tmp.lnebGDsOAY ++ rm /tmp/tmp.18FQDKaQPe /tmp/tmp.lnebGDsOAY ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=40 + echo -n . .+ [[ 40 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZyHIQHx8kc +++ mktemp ++ local LAST_ERR=/tmp/tmp.5H5oS7uyYC ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZyHIQHx8kc ++ cat /tmp/tmp.5H5oS7uyYC ++ rm /tmp/tmp.ZyHIQHx8kc /tmp/tmp.5H5oS7uyYC ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=41 + echo -n . .+ [[ 41 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xpuVSRUY6n +++ mktemp ++ local LAST_ERR=/tmp/tmp.DanZCzJbvO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xpuVSRUY6n ++ cat /tmp/tmp.DanZCzJbvO ++ rm /tmp/tmp.xpuVSRUY6n /tmp/tmp.DanZCzJbvO ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=42 + echo -n . .+ [[ 42 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.sjvsqrUzPj +++ mktemp ++ local LAST_ERR=/tmp/tmp.rNa9Htg4DK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.sjvsqrUzPj ++ cat /tmp/tmp.rNa9Htg4DK ++ rm /tmp/tmp.sjvsqrUzPj /tmp/tmp.rNa9Htg4DK ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=43 + echo -n . .+ [[ 43 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1bWWK8kE0d +++ mktemp ++ local LAST_ERR=/tmp/tmp.B34A8RJ8cl ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.1bWWK8kE0d ++ cat /tmp/tmp.B34A8RJ8cl ++ rm /tmp/tmp.1bWWK8kE0d /tmp/tmp.B34A8RJ8cl ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=44 + echo -n . .+ [[ 44 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bjDm66BsWb +++ mktemp ++ local LAST_ERR=/tmp/tmp.1pkADJ2KkI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bjDm66BsWb ++ cat /tmp/tmp.1pkADJ2KkI ++ rm /tmp/tmp.bjDm66BsWb /tmp/tmp.1pkADJ2KkI ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=45 + echo -n . .+ [[ 45 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5x2lTE4933 +++ mktemp ++ local LAST_ERR=/tmp/tmp.iLyEwSd3Pb ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.5x2lTE4933 ++ cat /tmp/tmp.iLyEwSd3Pb ++ rm /tmp/tmp.5x2lTE4933 /tmp/tmp.iLyEwSd3Pb ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=46 + echo -n . .+ [[ 46 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.NSxmQlsLTu +++ mktemp ++ local LAST_ERR=/tmp/tmp.lje7NBaWUH ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.NSxmQlsLTu ++ cat /tmp/tmp.lje7NBaWUH ++ rm /tmp/tmp.NSxmQlsLTu /tmp/tmp.lje7NBaWUH ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=47 + echo -n . .+ [[ 47 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6btBz4ucPr +++ mktemp ++ local LAST_ERR=/tmp/tmp.FP35lu3eld ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.6btBz4ucPr ++ cat /tmp/tmp.FP35lu3eld ++ rm /tmp/tmp.6btBz4ucPr /tmp/tmp.FP35lu3eld ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=48 + echo -n . .+ [[ 48 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.q1z3Rwp2Gh +++ mktemp ++ local LAST_ERR=/tmp/tmp.iQAHCWll3Y ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.q1z3Rwp2Gh ++ cat /tmp/tmp.iQAHCWll3Y ++ rm /tmp/tmp.q1z3Rwp2Gh /tmp/tmp.iQAHCWll3Y ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=49 + echo -n . .+ [[ 49 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ncYzXnBj5h +++ mktemp ++ local LAST_ERR=/tmp/tmp.AHPhPNLMXY ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ncYzXnBj5h ++ cat /tmp/tmp.AHPhPNLMXY ++ rm /tmp/tmp.ncYzXnBj5h /tmp/tmp.AHPhPNLMXY ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=50 + echo -n . .+ [[ 50 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pVGfx87S1q +++ mktemp ++ local LAST_ERR=/tmp/tmp.AjSvPD0UD9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.pVGfx87S1q ++ cat /tmp/tmp.AjSvPD0UD9 ++ rm /tmp/tmp.pVGfx87S1q /tmp/tmp.AjSvPD0UD9 ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=51 + echo -n . .+ [[ 51 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ecueHDAWz6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.r4c9H7LYnn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ecueHDAWz6 ++ cat /tmp/tmp.r4c9H7LYnn ++ rm /tmp/tmp.ecueHDAWz6 /tmp/tmp.r4c9H7LYnn ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=52 + echo -n . .+ [[ 52 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.IrtPuZXrHu +++ mktemp ++ local LAST_ERR=/tmp/tmp.lstUcqNtXI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.IrtPuZXrHu ++ cat /tmp/tmp.lstUcqNtXI ++ rm /tmp/tmp.IrtPuZXrHu /tmp/tmp.lstUcqNtXI ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=53 + echo -n . .+ [[ 53 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.62Ot9SIwDS +++ mktemp ++ local LAST_ERR=/tmp/tmp.stUG8wiJQx ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.62Ot9SIwDS ++ cat /tmp/tmp.stUG8wiJQx ++ rm /tmp/tmp.62Ot9SIwDS /tmp/tmp.stUG8wiJQx ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=54 + echo -n . .+ [[ 54 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8c5AYGslK2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.vKxHGchU0n ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8c5AYGslK2 ++ cat /tmp/tmp.vKxHGchU0n ++ rm /tmp/tmp.8c5AYGslK2 /tmp/tmp.vKxHGchU0n ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=55 + echo -n . .+ [[ 55 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4hARr2ghJe +++ mktemp ++ local LAST_ERR=/tmp/tmp.RYC3HtexyT ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.4hARr2ghJe ++ cat /tmp/tmp.RYC3HtexyT ++ rm /tmp/tmp.4hARr2ghJe /tmp/tmp.RYC3HtexyT ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=56 + echo -n . .+ [[ 56 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.D0fuJohNce +++ mktemp ++ local LAST_ERR=/tmp/tmp.HGLUUInySM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.D0fuJohNce ++ cat /tmp/tmp.HGLUUInySM ++ rm /tmp/tmp.D0fuJohNce /tmp/tmp.HGLUUInySM ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=57 + echo -n . .+ [[ 57 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cNrMMj6OlQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.a0tSBrqFJa ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.cNrMMj6OlQ ++ cat /tmp/tmp.a0tSBrqFJa ++ rm /tmp/tmp.cNrMMj6OlQ /tmp/tmp.a0tSBrqFJa ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=58 + echo -n . .+ [[ 58 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.U2NNMsJHAU +++ mktemp ++ local LAST_ERR=/tmp/tmp.skDfDjrmLM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.U2NNMsJHAU ++ cat /tmp/tmp.skDfDjrmLM ++ rm /tmp/tmp.U2NNMsJHAU /tmp/tmp.skDfDjrmLM ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=59 + echo -n . .+ [[ 59 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.12DvTiEX2S +++ mktemp ++ local LAST_ERR=/tmp/tmp.eXa8qZOS4R ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.12DvTiEX2S ++ cat /tmp/tmp.eXa8qZOS4R ++ rm /tmp/tmp.12DvTiEX2S /tmp/tmp.eXa8qZOS4R ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=60 + echo -n . .+ [[ 60 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HL0wig988D +++ mktemp ++ local LAST_ERR=/tmp/tmp.nAzwxDYWKX ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HL0wig988D ++ cat /tmp/tmp.nAzwxDYWKX ++ rm /tmp/tmp.HL0wig988D /tmp/tmp.nAzwxDYWKX ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=61 + echo -n . .+ [[ 61 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.S9DQIqyz8v +++ mktemp ++ local LAST_ERR=/tmp/tmp.eqJ9mAdbvn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.S9DQIqyz8v ++ cat /tmp/tmp.eqJ9mAdbvn ++ rm /tmp/tmp.S9DQIqyz8v /tmp/tmp.eqJ9mAdbvn ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=62 + echo -n . .+ [[ 62 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cK7iTMh3QY +++ mktemp ++ local LAST_ERR=/tmp/tmp.cynXNGSo10 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.cK7iTMh3QY ++ cat /tmp/tmp.cynXNGSo10 ++ rm /tmp/tmp.cK7iTMh3QY /tmp/tmp.cynXNGSo10 ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=63 + echo -n . .+ [[ 63 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OekWFSqjqe +++ mktemp ++ local LAST_ERR=/tmp/tmp.1vP3LQGL6Z ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OekWFSqjqe ++ cat /tmp/tmp.1vP3LQGL6Z ++ rm /tmp/tmp.OekWFSqjqe /tmp/tmp.1vP3LQGL6Z ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=64 + echo -n . .+ [[ 64 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.M5J1tKdpLN +++ mktemp ++ local LAST_ERR=/tmp/tmp.QruhG16KhR ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.M5J1tKdpLN ++ cat /tmp/tmp.QruhG16KhR ++ rm /tmp/tmp.M5J1tKdpLN /tmp/tmp.QruhG16KhR ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=65 + echo -n . .+ [[ 65 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Oh7S2qTb9o +++ mktemp ++ local LAST_ERR=/tmp/tmp.sR6evgYigL ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Oh7S2qTb9o ++ cat /tmp/tmp.sR6evgYigL ++ rm /tmp/tmp.Oh7S2qTb9o /tmp/tmp.sR6evgYigL ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=66 + echo -n . .+ [[ 66 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Ccm8a0St8Y +++ mktemp ++ local LAST_ERR=/tmp/tmp.qCjrnm54lq ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Ccm8a0St8Y ++ cat /tmp/tmp.qCjrnm54lq ++ rm /tmp/tmp.Ccm8a0St8Y /tmp/tmp.qCjrnm54lq ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=67 + echo -n . .+ [[ 67 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.i4IRbVPonf +++ mktemp ++ local LAST_ERR=/tmp/tmp.NdnoPa1p1K ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.i4IRbVPonf ++ cat /tmp/tmp.NdnoPa1p1K ++ rm /tmp/tmp.i4IRbVPonf /tmp/tmp.NdnoPa1p1K ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=68 + echo -n . .+ [[ 68 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3GLKOB8E8v +++ mktemp ++ local LAST_ERR=/tmp/tmp.xX46huNqM5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3GLKOB8E8v ++ cat /tmp/tmp.xX46huNqM5 ++ rm /tmp/tmp.3GLKOB8E8v /tmp/tmp.xX46huNqM5 ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=69 + echo -n . .+ [[ 69 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hy1kmes8ri +++ mktemp ++ local LAST_ERR=/tmp/tmp.O3bKHLztMR ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hy1kmes8ri ++ cat /tmp/tmp.O3bKHLztMR ++ rm /tmp/tmp.hy1kmes8ri /tmp/tmp.O3bKHLztMR ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=70 + echo -n . .+ [[ 70 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hJkVa03Uxa +++ mktemp ++ local LAST_ERR=/tmp/tmp.ncTMmcTMrK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hJkVa03Uxa ++ cat /tmp/tmp.ncTMmcTMrK ++ rm /tmp/tmp.hJkVa03Uxa /tmp/tmp.ncTMmcTMrK ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=71 + echo -n . .+ [[ 71 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.iFOczOW7Qj +++ mktemp ++ local LAST_ERR=/tmp/tmp.3v4VsngBHI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.iFOczOW7Qj ++ cat /tmp/tmp.3v4VsngBHI ++ rm /tmp/tmp.iFOczOW7Qj /tmp/tmp.3v4VsngBHI ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=72 + echo -n . .+ [[ 72 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kzRxlE4spF +++ mktemp ++ local LAST_ERR=/tmp/tmp.as1p3U1XTI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.kzRxlE4spF ++ cat /tmp/tmp.as1p3U1XTI ++ rm /tmp/tmp.kzRxlE4spF /tmp/tmp.as1p3U1XTI ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=73 + echo -n . .+ [[ 73 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.P4u2elkxCb +++ mktemp ++ local LAST_ERR=/tmp/tmp.GgIbYCVrDi ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.P4u2elkxCb ++ cat /tmp/tmp.GgIbYCVrDi ++ rm /tmp/tmp.P4u2elkxCb /tmp/tmp.GgIbYCVrDi ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=74 + echo -n . .+ [[ 74 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XqOLzfbb1N +++ mktemp ++ local LAST_ERR=/tmp/tmp.oKFOXElB1k ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XqOLzfbb1N ++ cat /tmp/tmp.oKFOXElB1k ++ rm /tmp/tmp.XqOLzfbb1N /tmp/tmp.oKFOXElB1k ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=75 + echo -n . .+ [[ 75 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.C6wlMOeMd3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.QgE4FSNiIG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.C6wlMOeMd3 ++ cat /tmp/tmp.QgE4FSNiIG ++ rm /tmp/tmp.C6wlMOeMd3 /tmp/tmp.QgE4FSNiIG ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=76 + echo -n . .+ [[ 76 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1oYeYl5qJH +++ mktemp ++ local LAST_ERR=/tmp/tmp.KPD3Jn4Eyd ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.1oYeYl5qJH ++ cat /tmp/tmp.KPD3Jn4Eyd ++ rm /tmp/tmp.1oYeYl5qJH /tmp/tmp.KPD3Jn4Eyd ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=77 + echo -n . .+ [[ 77 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QTtFlaYAs9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.qRFnVFNzAg ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.QTtFlaYAs9 ++ cat /tmp/tmp.qRFnVFNzAg ++ rm /tmp/tmp.QTtFlaYAs9 /tmp/tmp.qRFnVFNzAg ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=78 + echo -n . .+ [[ 78 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wVFOAJDZMg +++ mktemp ++ local LAST_ERR=/tmp/tmp.LnbOdWSLaY ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.wVFOAJDZMg ++ cat /tmp/tmp.LnbOdWSLaY ++ rm /tmp/tmp.wVFOAJDZMg /tmp/tmp.LnbOdWSLaY ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=79 + echo -n . .+ [[ 79 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0BCf7Lv5lZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.tfHpkeTIYp ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.0BCf7Lv5lZ ++ cat /tmp/tmp.tfHpkeTIYp ++ rm /tmp/tmp.0BCf7Lv5lZ /tmp/tmp.tfHpkeTIYp ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=80 + echo -n . .+ [[ 80 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DXnJ8vuRYC +++ mktemp ++ local LAST_ERR=/tmp/tmp.WUt9MNrJNv ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.DXnJ8vuRYC ++ cat /tmp/tmp.WUt9MNrJNv ++ rm /tmp/tmp.DXnJ8vuRYC /tmp/tmp.WUt9MNrJNv ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=81 + echo -n . .+ [[ 81 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xvI9qhvYAe +++ mktemp ++ local LAST_ERR=/tmp/tmp.e1TY7Mf3AL ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xvI9qhvYAe ++ cat /tmp/tmp.e1TY7Mf3AL ++ rm /tmp/tmp.xvI9qhvYAe /tmp/tmp.e1TY7Mf3AL ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=82 + echo -n . .+ [[ 82 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.G6ZSqPCCRJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.SFWdpxRZc9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.G6ZSqPCCRJ ++ cat /tmp/tmp.SFWdpxRZc9 ++ rm /tmp/tmp.G6ZSqPCCRJ /tmp/tmp.SFWdpxRZc9 ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=83 + echo -n . .+ [[ 83 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Cq8Fg9WUG2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.r1P6qGGH9n ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Cq8Fg9WUG2 ++ cat /tmp/tmp.r1P6qGGH9n ++ rm /tmp/tmp.Cq8Fg9WUG2 /tmp/tmp.r1P6qGGH9n ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=84 + echo -n . .+ [[ 84 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JzRwYjkOGh +++ mktemp ++ local LAST_ERR=/tmp/tmp.ywhPdtre9K ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.JzRwYjkOGh ++ cat /tmp/tmp.ywhPdtre9K ++ rm /tmp/tmp.JzRwYjkOGh /tmp/tmp.ywhPdtre9K ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=85 + echo -n . .+ [[ 85 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5ZC2wfUNIx +++ mktemp ++ local LAST_ERR=/tmp/tmp.A9WyWygGLI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.5ZC2wfUNIx ++ cat /tmp/tmp.A9WyWygGLI ++ rm /tmp/tmp.5ZC2wfUNIx /tmp/tmp.A9WyWygGLI ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=86 + echo -n . .+ [[ 86 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.A227cas4UZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.3Zoygkimmt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.A227cas4UZ ++ cat /tmp/tmp.3Zoygkimmt ++ rm /tmp/tmp.A227cas4UZ /tmp/tmp.3Zoygkimmt ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=87 + echo -n . .+ [[ 87 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.00sZS0YEhA +++ mktemp ++ local LAST_ERR=/tmp/tmp.3T2henlcZe ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.00sZS0YEhA ++ cat /tmp/tmp.3T2henlcZe ++ rm /tmp/tmp.00sZS0YEhA /tmp/tmp.3T2henlcZe ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=88 + echo -n . .+ [[ 88 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nHvhTnb1Fy +++ mktemp ++ local LAST_ERR=/tmp/tmp.xLVePtV0ng ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.nHvhTnb1Fy ++ cat /tmp/tmp.xLVePtV0ng ++ rm /tmp/tmp.nHvhTnb1Fy /tmp/tmp.xLVePtV0ng ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=89 + echo -n . .+ [[ 89 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mrGEN6JeAD +++ mktemp ++ local LAST_ERR=/tmp/tmp.tYyYOwQK4N ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.mrGEN6JeAD ++ cat /tmp/tmp.tYyYOwQK4N ++ rm /tmp/tmp.mrGEN6JeAD /tmp/tmp.tYyYOwQK4N ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=90 + echo -n . .+ [[ 90 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pQV9qp0EJ3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Wioobs8BWm ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.pQV9qp0EJ3 ++ cat /tmp/tmp.Wioobs8BWm ++ rm /tmp/tmp.pQV9qp0EJ3 /tmp/tmp.Wioobs8BWm ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=91 + echo -n . .+ [[ 91 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.q1VfoziPIZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.aaFMUKOQZP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.q1VfoziPIZ ++ cat /tmp/tmp.aaFMUKOQZP ++ rm /tmp/tmp.q1VfoziPIZ /tmp/tmp.aaFMUKOQZP ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=92 + echo -n . .+ [[ 92 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vAOhpAT7bm +++ mktemp ++ local LAST_ERR=/tmp/tmp.RGMYInDlSa ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vAOhpAT7bm ++ cat /tmp/tmp.RGMYInDlSa ++ rm /tmp/tmp.vAOhpAT7bm /tmp/tmp.RGMYInDlSa ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=93 + echo -n . .+ [[ 93 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yPYHxLSSce +++ mktemp ++ local LAST_ERR=/tmp/tmp.mgqNObS5f5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yPYHxLSSce ++ cat /tmp/tmp.mgqNObS5f5 ++ rm /tmp/tmp.yPYHxLSSce /tmp/tmp.mgqNObS5f5 ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=94 + echo -n . .+ [[ 94 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jGAvf8m08H +++ mktemp ++ local LAST_ERR=/tmp/tmp.GMhIonneQb ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.jGAvf8m08H ++ cat /tmp/tmp.GMhIonneQb ++ rm /tmp/tmp.jGAvf8m08H /tmp/tmp.GMhIonneQb ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=95 + echo -n . .+ [[ 95 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DLP62Xvt8Y +++ mktemp ++ local LAST_ERR=/tmp/tmp.TDfTy4l5tx ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.DLP62Xvt8Y ++ cat /tmp/tmp.TDfTy4l5tx ++ rm /tmp/tmp.DLP62Xvt8Y /tmp/tmp.TDfTy4l5tx ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=96 + echo -n . .+ [[ 96 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hUJ5HbT4n8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.GzS0V6X676 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hUJ5HbT4n8 ++ cat /tmp/tmp.GzS0V6X676 ++ rm /tmp/tmp.hUJ5HbT4n8 /tmp/tmp.GzS0V6X676 ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=97 + echo -n . .+ [[ 97 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Z7plPbqk2g +++ mktemp ++ local LAST_ERR=/tmp/tmp.VWsC2rcn1x ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Z7plPbqk2g ++ cat /tmp/tmp.VWsC2rcn1x ++ rm /tmp/tmp.Z7plPbqk2g /tmp/tmp.VWsC2rcn1x ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=98 + echo -n . .+ [[ 98 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5YLdl7agfQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.jwhhx5JqCw ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.5YLdl7agfQ ++ cat /tmp/tmp.jwhhx5JqCw ++ rm /tmp/tmp.5YLdl7agfQ /tmp/tmp.jwhhx5JqCw ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=99 + echo -n . .+ [[ 99 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yIMEQY4Jtb +++ mktemp ++ local LAST_ERR=/tmp/tmp.or9HUtVXac ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yIMEQY4Jtb ++ cat /tmp/tmp.or9HUtVXac ++ rm /tmp/tmp.yIMEQY4Jtb /tmp/tmp.or9HUtVXac ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=100 + echo -n . .+ [[ 100 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8psaRxPOpo +++ mktemp ++ local LAST_ERR=/tmp/tmp.FtcSBurZpS ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8psaRxPOpo ++ cat /tmp/tmp.FtcSBurZpS ++ rm /tmp/tmp.8psaRxPOpo /tmp/tmp.FtcSBurZpS ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=101 + echo -n . .+ [[ 101 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.e4oGCdu0yG +++ mktemp ++ local LAST_ERR=/tmp/tmp.1d19kEeQ1S ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.e4oGCdu0yG ++ cat /tmp/tmp.1d19kEeQ1S ++ rm /tmp/tmp.e4oGCdu0yG /tmp/tmp.1d19kEeQ1S ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=102 + echo -n . .+ [[ 102 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Cn2c2PfQvz +++ mktemp ++ local LAST_ERR=/tmp/tmp.ciWTHMErP3 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Cn2c2PfQvz ++ cat /tmp/tmp.ciWTHMErP3 ++ rm /tmp/tmp.Cn2c2PfQvz /tmp/tmp.ciWTHMErP3 ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=103 + echo -n . .+ [[ 103 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KQ2XXb7C16 +++ mktemp ++ local LAST_ERR=/tmp/tmp.EXQyRk70Vl ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.KQ2XXb7C16 ++ cat /tmp/tmp.EXQyRk70Vl ++ rm /tmp/tmp.KQ2XXb7C16 /tmp/tmp.EXQyRk70Vl ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=104 + echo -n . .+ [[ 104 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EWMB4KySiB +++ mktemp ++ local LAST_ERR=/tmp/tmp.SnpjhwJGaj ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.EWMB4KySiB ++ cat /tmp/tmp.SnpjhwJGaj ++ rm /tmp/tmp.EWMB4KySiB /tmp/tmp.SnpjhwJGaj ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=105 + echo -n . .+ [[ 105 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hR8CctzmrU +++ mktemp ++ local LAST_ERR=/tmp/tmp.bQ65uNWP9n ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hR8CctzmrU ++ cat /tmp/tmp.bQ65uNWP9n ++ rm /tmp/tmp.hR8CctzmrU /tmp/tmp.bQ65uNWP9n ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=106 + echo -n . .+ [[ 106 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.f3yUBWRrAm +++ mktemp ++ local LAST_ERR=/tmp/tmp.pQF1pigI9n ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.f3yUBWRrAm ++ cat /tmp/tmp.pQF1pigI9n ++ rm /tmp/tmp.f3yUBWRrAm /tmp/tmp.pQF1pigI9n ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=107 + echo -n . .+ [[ 107 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wNvV0rYtBw +++ mktemp ++ local LAST_ERR=/tmp/tmp.5a8HqTqHos ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.wNvV0rYtBw ++ cat /tmp/tmp.5a8HqTqHos ++ rm /tmp/tmp.wNvV0rYtBw /tmp/tmp.5a8HqTqHos ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=108 + echo -n . .+ [[ 108 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xZzvDxr6L7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.wKLsSs8cK8 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xZzvDxr6L7 ++ cat /tmp/tmp.wKLsSs8cK8 ++ rm /tmp/tmp.xZzvDxr6L7 /tmp/tmp.wKLsSs8cK8 ++ return 0 + [[ stopping == ready ]] + sleep 1 + timeout=109 + echo -n . .+ [[ 109 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7To4if3GYR +++ mktemp ++ local LAST_ERR=/tmp/tmp.8MZq3AXYfj ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.7To4if3GYR ++ cat /tmp/tmp.8MZq3AXYfj ++ rm /tmp/tmp.7To4if3GYR /tmp/tmp.8MZq3AXYfj ++ return 0 + [[ paused == ready ]] + sleep 1 + timeout=110 + echo -n . .+ [[ 110 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zz7F6EH2I8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.jn8lAF4SlN ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.zz7F6EH2I8 ++ cat /tmp/tmp.jn8lAF4SlN ++ rm /tmp/tmp.zz7F6EH2I8 /tmp/tmp.jn8lAF4SlN ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=111 + echo -n . .+ [[ 111 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PS7dcaozu4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.3eqy7oZMgI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.PS7dcaozu4 ++ cat /tmp/tmp.3eqy7oZMgI ++ rm /tmp/tmp.PS7dcaozu4 /tmp/tmp.3eqy7oZMgI ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=112 + echo -n . .+ [[ 112 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fTQYElszwK +++ mktemp ++ local LAST_ERR=/tmp/tmp.qBN9eI73Us ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fTQYElszwK ++ cat /tmp/tmp.qBN9eI73Us ++ rm /tmp/tmp.fTQYElszwK /tmp/tmp.qBN9eI73Us ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=113 + echo -n . .+ [[ 113 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bMH9eKTzoQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.yUmlhvR2Ni ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bMH9eKTzoQ ++ cat /tmp/tmp.yUmlhvR2Ni ++ rm /tmp/tmp.bMH9eKTzoQ /tmp/tmp.yUmlhvR2Ni ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=114 + echo -n . .+ [[ 114 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bSI23XESw6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Kf84cBaClP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bSI23XESw6 ++ cat /tmp/tmp.Kf84cBaClP ++ rm /tmp/tmp.bSI23XESw6 /tmp/tmp.Kf84cBaClP ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=115 + echo -n . .+ [[ 115 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.J8lIQ48Obp +++ mktemp ++ local LAST_ERR=/tmp/tmp.q4BVPkYdI1 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.J8lIQ48Obp ++ cat /tmp/tmp.q4BVPkYdI1 ++ rm /tmp/tmp.J8lIQ48Obp /tmp/tmp.q4BVPkYdI1 ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=116 + echo -n . .+ [[ 116 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4JLOJEAa5w +++ mktemp ++ local LAST_ERR=/tmp/tmp.25PAtaMJCN ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.4JLOJEAa5w ++ cat /tmp/tmp.25PAtaMJCN ++ rm /tmp/tmp.4JLOJEAa5w /tmp/tmp.25PAtaMJCN ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=117 + echo -n . .+ [[ 117 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qq1eI3xHEO +++ mktemp ++ local LAST_ERR=/tmp/tmp.r00mUB8LB6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.qq1eI3xHEO ++ cat /tmp/tmp.r00mUB8LB6 ++ rm /tmp/tmp.qq1eI3xHEO /tmp/tmp.r00mUB8LB6 ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=118 + echo -n . .+ [[ 118 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.J84U1Rtfa3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.9EoivvzjmF ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.J84U1Rtfa3 ++ cat /tmp/tmp.9EoivvzjmF ++ rm /tmp/tmp.J84U1Rtfa3 /tmp/tmp.9EoivvzjmF ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=119 + echo -n . .+ [[ 119 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dj9kJBusXY +++ mktemp ++ local LAST_ERR=/tmp/tmp.m2rr5S9tEn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.dj9kJBusXY ++ cat /tmp/tmp.m2rr5S9tEn ++ rm /tmp/tmp.dj9kJBusXY /tmp/tmp.m2rr5S9tEn ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=120 + echo -n . .+ [[ 120 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xznmJ5aL8S +++ mktemp ++ local LAST_ERR=/tmp/tmp.65j2c3bOdx ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xznmJ5aL8S ++ cat /tmp/tmp.65j2c3bOdx ++ rm /tmp/tmp.xznmJ5aL8S /tmp/tmp.65j2c3bOdx ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=121 + echo -n . .+ [[ 121 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZUWmeQbosa +++ mktemp ++ local LAST_ERR=/tmp/tmp.9iqhX6vfgl ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZUWmeQbosa ++ cat /tmp/tmp.9iqhX6vfgl ++ rm /tmp/tmp.ZUWmeQbosa /tmp/tmp.9iqhX6vfgl ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=122 + echo -n . .+ [[ 122 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7owiUJTCuw +++ mktemp ++ local LAST_ERR=/tmp/tmp.UaWDBl7hQE ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.7owiUJTCuw ++ cat /tmp/tmp.UaWDBl7hQE ++ rm /tmp/tmp.7owiUJTCuw /tmp/tmp.UaWDBl7hQE ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=123 + echo -n . .+ [[ 123 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8Qesa2KB85 +++ mktemp ++ local LAST_ERR=/tmp/tmp.5ftJn3xXSW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8Qesa2KB85 ++ cat /tmp/tmp.5ftJn3xXSW ++ rm /tmp/tmp.8Qesa2KB85 /tmp/tmp.5ftJn3xXSW ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=124 + echo -n . .+ [[ 124 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vLd4PfxyTw +++ mktemp ++ local LAST_ERR=/tmp/tmp.gJGsSnynbU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vLd4PfxyTw ++ cat /tmp/tmp.gJGsSnynbU ++ rm /tmp/tmp.vLd4PfxyTw /tmp/tmp.gJGsSnynbU ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=125 + echo -n . .+ [[ 125 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.j0wPJBDAtC +++ mktemp ++ local LAST_ERR=/tmp/tmp.JJh4892Zjz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.j0wPJBDAtC ++ cat /tmp/tmp.JJh4892Zjz ++ rm /tmp/tmp.j0wPJBDAtC /tmp/tmp.JJh4892Zjz ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=126 + echo -n . .+ [[ 126 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zwhdVzF2dT +++ mktemp ++ local LAST_ERR=/tmp/tmp.3cLTTgiES6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.zwhdVzF2dT ++ cat /tmp/tmp.3cLTTgiES6 ++ rm /tmp/tmp.zwhdVzF2dT /tmp/tmp.3cLTTgiES6 ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=127 + echo -n . .+ [[ 127 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pZGwJVYVKd +++ mktemp ++ local LAST_ERR=/tmp/tmp.NNzRn1axQD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.pZGwJVYVKd ++ cat /tmp/tmp.NNzRn1axQD ++ rm /tmp/tmp.pZGwJVYVKd /tmp/tmp.NNzRn1axQD ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=128 + echo -n . .+ [[ 128 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9ASlNbVCGI +++ mktemp ++ local LAST_ERR=/tmp/tmp.ogs9P3CCif ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.9ASlNbVCGI ++ cat /tmp/tmp.ogs9P3CCif ++ rm /tmp/tmp.9ASlNbVCGI /tmp/tmp.ogs9P3CCif ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=129 + echo -n . .+ [[ 129 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.W2RwKCx1uA +++ mktemp ++ local LAST_ERR=/tmp/tmp.MQyIMyEhCR ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.W2RwKCx1uA ++ cat /tmp/tmp.MQyIMyEhCR ++ rm /tmp/tmp.W2RwKCx1uA /tmp/tmp.MQyIMyEhCR ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=130 + echo -n . .+ [[ 130 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vV1N5lXqYA +++ mktemp ++ local LAST_ERR=/tmp/tmp.WGDqsToihe ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vV1N5lXqYA ++ cat /tmp/tmp.WGDqsToihe ++ rm /tmp/tmp.vV1N5lXqYA /tmp/tmp.WGDqsToihe ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=131 + echo -n . .+ [[ 131 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7R9ma3VbV1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.8G8b1LSRl4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.7R9ma3VbV1 ++ cat /tmp/tmp.8G8b1LSRl4 ++ rm /tmp/tmp.7R9ma3VbV1 /tmp/tmp.8G8b1LSRl4 ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=132 + echo -n . .+ [[ 132 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.75v7QjVwEO +++ mktemp ++ local LAST_ERR=/tmp/tmp.KSpYsBwoxH ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.75v7QjVwEO ++ cat /tmp/tmp.KSpYsBwoxH ++ rm /tmp/tmp.75v7QjVwEO /tmp/tmp.KSpYsBwoxH ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=133 + echo -n . .+ [[ 133 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gVJVUcqZr1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.XmNj6OImKU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.gVJVUcqZr1 ++ cat /tmp/tmp.XmNj6OImKU ++ rm /tmp/tmp.gVJVUcqZr1 /tmp/tmp.XmNj6OImKU ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=134 + echo -n . .+ [[ 134 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.i6ozfcMsbP +++ mktemp ++ local LAST_ERR=/tmp/tmp.8KzNuHYhDQ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.i6ozfcMsbP ++ cat /tmp/tmp.8KzNuHYhDQ ++ rm /tmp/tmp.i6ozfcMsbP /tmp/tmp.8KzNuHYhDQ ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=135 + echo -n . .+ [[ 135 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Z95LxEYQ5a +++ mktemp ++ local LAST_ERR=/tmp/tmp.5C8SS1ZwBz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Z95LxEYQ5a ++ cat /tmp/tmp.5C8SS1ZwBz ++ rm /tmp/tmp.Z95LxEYQ5a /tmp/tmp.5C8SS1ZwBz ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=136 + echo -n . .+ [[ 136 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FaISo9fTYC +++ mktemp ++ local LAST_ERR=/tmp/tmp.N8GlhpD6zP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.FaISo9fTYC ++ cat /tmp/tmp.N8GlhpD6zP ++ rm /tmp/tmp.FaISo9fTYC /tmp/tmp.N8GlhpD6zP ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=137 + echo -n . .+ [[ 137 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.r749Wbwsei +++ mktemp ++ local LAST_ERR=/tmp/tmp.eHnqfKYdw3 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.r749Wbwsei ++ cat /tmp/tmp.eHnqfKYdw3 ++ rm /tmp/tmp.r749Wbwsei /tmp/tmp.eHnqfKYdw3 ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=138 + echo -n . .+ [[ 138 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DswkmS6JB9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.8OK1JYbARc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.DswkmS6JB9 ++ cat /tmp/tmp.8OK1JYbARc ++ rm /tmp/tmp.DswkmS6JB9 /tmp/tmp.8OK1JYbARc ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=139 + echo -n . .+ [[ 139 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QkKFPeWpkw +++ mktemp ++ local LAST_ERR=/tmp/tmp.j4hE8W9vgb ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.QkKFPeWpkw ++ cat /tmp/tmp.j4hE8W9vgb ++ rm /tmp/tmp.QkKFPeWpkw /tmp/tmp.j4hE8W9vgb ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=140 + echo -n . .+ [[ 140 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9je0wWTjRl +++ mktemp ++ local LAST_ERR=/tmp/tmp.47PGHXJNrs ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.9je0wWTjRl ++ cat /tmp/tmp.47PGHXJNrs ++ rm /tmp/tmp.9je0wWTjRl /tmp/tmp.47PGHXJNrs ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=141 + echo -n . .+ [[ 141 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YNBMhPkOq5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.8DKXlJLl9O ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.YNBMhPkOq5 ++ cat /tmp/tmp.8DKXlJLl9O ++ rm /tmp/tmp.YNBMhPkOq5 /tmp/tmp.8DKXlJLl9O ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=142 + echo -n . .+ [[ 142 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TRxCp9MhbK +++ mktemp ++ local LAST_ERR=/tmp/tmp.M5hMDhXA0f ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.TRxCp9MhbK ++ cat /tmp/tmp.M5hMDhXA0f ++ rm /tmp/tmp.TRxCp9MhbK /tmp/tmp.M5hMDhXA0f ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=143 + echo -n . .+ [[ 143 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.00CmeTe0O3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.VsDMF1SIpz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.00CmeTe0O3 ++ cat /tmp/tmp.VsDMF1SIpz ++ rm /tmp/tmp.00CmeTe0O3 /tmp/tmp.VsDMF1SIpz ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=144 + echo -n . .+ [[ 144 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GqC2lYsWOH +++ mktemp ++ local LAST_ERR=/tmp/tmp.VLgjsMiUEK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.GqC2lYsWOH ++ cat /tmp/tmp.VLgjsMiUEK ++ rm /tmp/tmp.GqC2lYsWOH /tmp/tmp.VLgjsMiUEK ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=145 + echo -n . .+ [[ 145 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VWnQfbiViH +++ mktemp ++ local LAST_ERR=/tmp/tmp.MvcendxXha ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.VWnQfbiViH ++ cat /tmp/tmp.MvcendxXha ++ rm /tmp/tmp.VWnQfbiViH /tmp/tmp.MvcendxXha ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=146 + echo -n . .+ [[ 146 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.IfSmB8wZsY +++ mktemp ++ local LAST_ERR=/tmp/tmp.4pK8r1R0PS ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.IfSmB8wZsY ++ cat /tmp/tmp.4pK8r1R0PS ++ rm /tmp/tmp.IfSmB8wZsY /tmp/tmp.4pK8r1R0PS ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=147 + echo -n . .+ [[ 147 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tMSKtwbbVG +++ mktemp ++ local LAST_ERR=/tmp/tmp.JygmGQ6b9h ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.tMSKtwbbVG ++ cat /tmp/tmp.JygmGQ6b9h ++ rm /tmp/tmp.tMSKtwbbVG /tmp/tmp.JygmGQ6b9h ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=148 + echo -n . .+ [[ 148 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2UvmfZ9SpX +++ mktemp ++ local LAST_ERR=/tmp/tmp.Oc9xTbtcCQ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2UvmfZ9SpX ++ cat /tmp/tmp.Oc9xTbtcCQ ++ rm /tmp/tmp.2UvmfZ9SpX /tmp/tmp.Oc9xTbtcCQ ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=149 + echo -n . .+ [[ 149 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5x0eyvPXXW +++ mktemp ++ local LAST_ERR=/tmp/tmp.jFtBA2PzKd ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.5x0eyvPXXW ++ cat /tmp/tmp.jFtBA2PzKd ++ rm /tmp/tmp.5x0eyvPXXW /tmp/tmp.jFtBA2PzKd ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=150 + echo -n . .+ [[ 150 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WWGb25UR0V +++ mktemp ++ local LAST_ERR=/tmp/tmp.2wLQY3rams ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.WWGb25UR0V ++ cat /tmp/tmp.2wLQY3rams ++ rm /tmp/tmp.WWGb25UR0V /tmp/tmp.2wLQY3rams ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=151 + echo -n . .+ [[ 151 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ncmAx93nrj +++ mktemp ++ local LAST_ERR=/tmp/tmp.xMgRaRzn3r ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ncmAx93nrj ++ cat /tmp/tmp.xMgRaRzn3r ++ rm /tmp/tmp.ncmAx93nrj /tmp/tmp.xMgRaRzn3r ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=152 + echo -n . .+ [[ 152 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ySjecPutDT +++ mktemp ++ local LAST_ERR=/tmp/tmp.jDf2e5t7wG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ySjecPutDT ++ cat /tmp/tmp.jDf2e5t7wG ++ rm /tmp/tmp.ySjecPutDT /tmp/tmp.jDf2e5t7wG ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=153 + echo -n . .+ [[ 153 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tbWUeXzqrA +++ mktemp ++ local LAST_ERR=/tmp/tmp.qS3m6mv5eU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.tbWUeXzqrA ++ cat /tmp/tmp.qS3m6mv5eU ++ rm /tmp/tmp.tbWUeXzqrA /tmp/tmp.qS3m6mv5eU ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=154 + echo -n . .+ [[ 154 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vLZLByJUO8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.w8Xg60eIcg ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vLZLByJUO8 ++ cat /tmp/tmp.w8Xg60eIcg ++ rm /tmp/tmp.vLZLByJUO8 /tmp/tmp.w8Xg60eIcg ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=155 + echo -n . .+ [[ 155 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OWEfUO8tCr +++ mktemp ++ local LAST_ERR=/tmp/tmp.NUyhJq9egX ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OWEfUO8tCr ++ cat /tmp/tmp.NUyhJq9egX ++ rm /tmp/tmp.OWEfUO8tCr /tmp/tmp.NUyhJq9egX ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=156 + echo -n . .+ [[ 156 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.55MyP3ZH3N +++ mktemp ++ local LAST_ERR=/tmp/tmp.QYx92bCJUw ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.55MyP3ZH3N ++ cat /tmp/tmp.QYx92bCJUw ++ rm /tmp/tmp.55MyP3ZH3N /tmp/tmp.QYx92bCJUw ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=157 + echo -n . .+ [[ 157 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hrywYkzPXJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.hgCrQIKMej ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hrywYkzPXJ ++ cat /tmp/tmp.hgCrQIKMej ++ rm /tmp/tmp.hrywYkzPXJ /tmp/tmp.hgCrQIKMej ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=158 + echo -n . .+ [[ 158 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lcjMSZgkUT +++ mktemp ++ local LAST_ERR=/tmp/tmp.QJV43LeLZW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lcjMSZgkUT ++ cat /tmp/tmp.QJV43LeLZW ++ rm /tmp/tmp.lcjMSZgkUT /tmp/tmp.QJV43LeLZW ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=159 + echo -n . .+ [[ 159 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Gt7ENdCWKc +++ mktemp ++ local LAST_ERR=/tmp/tmp.dmD8LJCsbQ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Gt7ENdCWKc ++ cat /tmp/tmp.dmD8LJCsbQ ++ rm /tmp/tmp.Gt7ENdCWKc /tmp/tmp.dmD8LJCsbQ ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=160 + echo -n . .+ [[ 160 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.m0ywXbkZMe +++ mktemp ++ local LAST_ERR=/tmp/tmp.r18hCOGy6Q ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.m0ywXbkZMe ++ cat /tmp/tmp.r18hCOGy6Q ++ rm /tmp/tmp.m0ywXbkZMe /tmp/tmp.r18hCOGy6Q ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=161 + echo -n . .+ [[ 161 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gJ1X1pI3lz +++ mktemp ++ local LAST_ERR=/tmp/tmp.945Cif3sd7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.gJ1X1pI3lz ++ cat /tmp/tmp.945Cif3sd7 ++ rm /tmp/tmp.gJ1X1pI3lz /tmp/tmp.945Cif3sd7 ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=162 + echo -n . .+ [[ 162 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gY8HUQBwTl +++ mktemp ++ local LAST_ERR=/tmp/tmp.GzxpYq2QG6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.gY8HUQBwTl ++ cat /tmp/tmp.GzxpYq2QG6 ++ rm /tmp/tmp.gY8HUQBwTl /tmp/tmp.GzxpYq2QG6 ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=163 + echo -n . .+ [[ 163 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WQuN7fkTCG +++ mktemp ++ local LAST_ERR=/tmp/tmp.potTyJr1ua ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.WQuN7fkTCG ++ cat /tmp/tmp.potTyJr1ua ++ rm /tmp/tmp.WQuN7fkTCG /tmp/tmp.potTyJr1ua ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=164 + echo -n . .+ [[ 164 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pXcD3LVMyu +++ mktemp ++ local LAST_ERR=/tmp/tmp.Oaud9EGIwa ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.pXcD3LVMyu ++ cat /tmp/tmp.Oaud9EGIwa ++ rm /tmp/tmp.pXcD3LVMyu /tmp/tmp.Oaud9EGIwa ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=165 + echo -n . .+ [[ 165 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2cAoJ5BeNv +++ mktemp ++ local LAST_ERR=/tmp/tmp.WjCiMaguo5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2cAoJ5BeNv ++ cat /tmp/tmp.WjCiMaguo5 ++ rm /tmp/tmp.2cAoJ5BeNv /tmp/tmp.WjCiMaguo5 ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=166 + echo -n . .+ [[ 166 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.i5TANeF9vs +++ mktemp ++ local LAST_ERR=/tmp/tmp.SdmqwmLS27 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.i5TANeF9vs ++ cat /tmp/tmp.SdmqwmLS27 ++ rm /tmp/tmp.i5TANeF9vs /tmp/tmp.SdmqwmLS27 ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=167 + echo -n . .+ [[ 167 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UKQbYgzz2a +++ mktemp ++ local LAST_ERR=/tmp/tmp.HOFC2gVYYB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UKQbYgzz2a ++ cat /tmp/tmp.HOFC2gVYYB ++ rm /tmp/tmp.UKQbYgzz2a /tmp/tmp.HOFC2gVYYB ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=168 + echo -n . .+ [[ 168 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HKNyWDGQ9H +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZGWCJ0aWd7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HKNyWDGQ9H ++ cat /tmp/tmp.ZGWCJ0aWd7 ++ rm /tmp/tmp.HKNyWDGQ9H /tmp/tmp.ZGWCJ0aWd7 ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=169 + echo -n . .+ [[ 169 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.sR7SkyE4ZK +++ mktemp ++ local LAST_ERR=/tmp/tmp.2szYKuH91p ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.sR7SkyE4ZK ++ cat /tmp/tmp.2szYKuH91p ++ rm /tmp/tmp.sR7SkyE4ZK /tmp/tmp.2szYKuH91p ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=170 + echo -n . .+ [[ 170 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CdFNq3XPid +++ mktemp ++ local LAST_ERR=/tmp/tmp.PWLKWvu0Xz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.CdFNq3XPid ++ cat /tmp/tmp.PWLKWvu0Xz ++ rm /tmp/tmp.CdFNq3XPid /tmp/tmp.PWLKWvu0Xz ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=171 + echo -n . .+ [[ 171 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.aYjXZydKxq +++ mktemp ++ local LAST_ERR=/tmp/tmp.5KZqCMv6kE ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.aYjXZydKxq ++ cat /tmp/tmp.5KZqCMv6kE ++ rm /tmp/tmp.aYjXZydKxq /tmp/tmp.5KZqCMv6kE ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=172 + echo -n . .+ [[ 172 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UYR5iFmd2t +++ mktemp ++ local LAST_ERR=/tmp/tmp.0Xcp1ZFqyw ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UYR5iFmd2t ++ cat /tmp/tmp.0Xcp1ZFqyw ++ rm /tmp/tmp.UYR5iFmd2t /tmp/tmp.0Xcp1ZFqyw ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=173 + echo -n . .+ [[ 173 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ojyIJ7wR1V +++ mktemp ++ local LAST_ERR=/tmp/tmp.UdPWOZfizJ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ojyIJ7wR1V ++ cat /tmp/tmp.UdPWOZfizJ ++ rm /tmp/tmp.ojyIJ7wR1V /tmp/tmp.UdPWOZfizJ ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=174 + echo -n . .+ [[ 174 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6STDr8b0Th +++ mktemp ++ local LAST_ERR=/tmp/tmp.ON6WzqSyuv ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.6STDr8b0Th ++ cat /tmp/tmp.ON6WzqSyuv ++ rm /tmp/tmp.6STDr8b0Th /tmp/tmp.ON6WzqSyuv ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=175 + echo -n . .+ [[ 175 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.L6rQp8VMaq +++ mktemp ++ local LAST_ERR=/tmp/tmp.EEtVW2D44S ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.L6rQp8VMaq ++ cat /tmp/tmp.EEtVW2D44S ++ rm /tmp/tmp.L6rQp8VMaq /tmp/tmp.EEtVW2D44S ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=176 + echo -n . .+ [[ 176 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LCOv0XhtIC +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZNuEHyUYev ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.LCOv0XhtIC ++ cat /tmp/tmp.ZNuEHyUYev ++ rm /tmp/tmp.LCOv0XhtIC /tmp/tmp.ZNuEHyUYev ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=177 + echo -n . .+ [[ 177 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zdwk2iOEcP +++ mktemp ++ local LAST_ERR=/tmp/tmp.1IRaoFw9qr ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.zdwk2iOEcP ++ cat /tmp/tmp.1IRaoFw9qr ++ rm /tmp/tmp.zdwk2iOEcP /tmp/tmp.1IRaoFw9qr ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=178 + echo -n . .+ [[ 178 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7TN9ehIfns +++ mktemp ++ local LAST_ERR=/tmp/tmp.2ZRjzBZBeD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.7TN9ehIfns ++ cat /tmp/tmp.2ZRjzBZBeD ++ rm /tmp/tmp.7TN9ehIfns /tmp/tmp.2ZRjzBZBeD ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=179 + echo -n . .+ [[ 179 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OqT0Ej4NKj +++ mktemp ++ local LAST_ERR=/tmp/tmp.T5v8PS7ZA4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OqT0Ej4NKj ++ cat /tmp/tmp.T5v8PS7ZA4 ++ rm /tmp/tmp.OqT0Ej4NKj /tmp/tmp.T5v8PS7ZA4 ++ return 0 + [[ initializing == ready ]] + sleep 1 + timeout=180 + echo -n . .+ [[ 180 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.61NKFpU35E +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZEbSVKPYNO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.61NKFpU35E ++ cat /tmp/tmp.ZEbSVKPYNO ++ rm /tmp/tmp.61NKFpU35E /tmp/tmp.ZEbSVKPYNO ++ return 0 + [[ ready == ready ]] + echo + compare_kubectl statefulset/some-name-rs0 -tls-disabled + local resource=statefulset/some-name-rs0 + local postfix=-tls-disabled + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-rs0-tls-disabled.yml + local new_result=/tmp/tmp.aSxxw5JDFg/statefulset_some-name-rs0.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-rs0-tls-disabled-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-rs0 ++ mktemp + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.B6JIjFvcv7 ++ mktemp + local LAST_ERR=/tmp/tmp.GqN5fUEP5Q + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-rs0 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.B6JIjFvcv7 + cat /tmp/tmp.GqN5fUEP5Q + rm /tmp/tmp.B6JIjFvcv7 /tmp/tmp.GqN5fUEP5Q + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-rs0.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-rs0.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-rs0.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-rs0-tls-disabled.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-rs0-tls-disabled.yml /tmp/tmp.aSxxw5JDFg/statefulset_some-name-rs0.yml + compare_kubectl statefulset/some-name-cfg -tls-disabled + local resource=statefulset/some-name-cfg + local postfix=-tls-disabled + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-cfg-tls-disabled.yml + local new_result=/tmp/tmp.aSxxw5JDFg/statefulset_some-name-cfg.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-cfg-tls-disabled-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-cfg + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.QW01RkVxE3 ++ mktemp + local LAST_ERR=/tmp/tmp.NCT8YJHiTa + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-cfg + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.QW01RkVxE3 + cat /tmp/tmp.NCT8YJHiTa + rm /tmp/tmp.QW01RkVxE3 /tmp/tmp.NCT8YJHiTa + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-cfg.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-cfg.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-cfg.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-cfg-tls-disabled.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-cfg-tls-disabled.yml /tmp/tmp.aSxxw5JDFg/statefulset_some-name-cfg.yml + compare_kubectl statefulset/some-name-mongos -tls-disabled + local resource=statefulset/some-name-mongos + local postfix=-tls-disabled + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-mongos-tls-disabled.yml + local new_result=/tmp/tmp.aSxxw5JDFg/statefulset_some-name-mongos.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-mongos-tls-disabled-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-mongos ++ mktemp + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("tls-issue-cert-manager-19787", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.maoS1NGrkO ++ mktemp + local LAST_ERR=/tmp/tmp.gFYxJqWbdd + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.maoS1NGrkO + cat /tmp/tmp.gFYxJqWbdd + rm /tmp/tmp.maoS1NGrkO /tmp/tmp.gFYxJqWbdd + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-mongos.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-mongos.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.aSxxw5JDFg/statefulset_some-name-mongos.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-mongos-tls-disabled.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/e2e-tests/tls-issue-cert-manager/compare/statefulset_some-name-mongos-tls-disabled.yml /tmp/tmp.aSxxw5JDFg/statefulset_some-name-mongos.yml + destroy tls-issue-cert-manager-19787 + local namespace=tls-issue-cert-manager-19787 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false ']' + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.MDbs6VzQTX ++ mktemp + local LAST_ERR=/tmp/tmp.c80YrF6YLv + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.MDbs6VzQTX customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.c80YrF6YLv + rm /tmp/tmp.MDbs6VzQTX /tmp/tmp.c80YrF6YLv + return 0 ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/crd.yaml ++ grep -v '\-\-\-' + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.qAfaMVEsXN ++ mktemp + local LAST_ERR=/tmp/tmp.RQ0EEE39t9 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.qAfaMVEsXN + cat /tmp/tmp.RQ0EEE39t9 + rm /tmp/tmp.qAfaMVEsXN /tmp/tmp.RQ0EEE39t9 + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.ke0pYhAD2O ++ mktemp + local LAST_ERR=/tmp/tmp.fXXJPbaPwI + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ke0pYhAD2O + cat /tmp/tmp.fXXJPbaPwI + rm /tmp/tmp.ke0pYhAD2O /tmp/tmp.fXXJPbaPwI + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' No resources found + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' E0503 07:46:43.442534 908 memcache.go:287] couldn't get resource list for psmdb.percona.com/v1: the server could not find the requested resource E0503 07:46:43.445597 908 memcache.go:287] couldn't get resource list for psmdb.percona.com/v1-10-0: the server could not find the requested resource E0503 07:46:43.459606 908 memcache.go:287] couldn't get resource list for psmdb.percona.com/v1-11-0: the server could not find the requested resource E0503 07:46:43.461744 908 memcache.go:287] couldn't get resource list for psmdb.percona.com/v1-12-0: the server could not find the requested resource error: the server doesn't have a resource type "perconaservermongodbs" + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.nDZPlVlERK ++ mktemp + local LAST_ERR=/tmp/tmp.FqGBdsCANH + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.nDZPlVlERK + cat /tmp/tmp.FqGBdsCANH + rm /tmp/tmp.nDZPlVlERK /tmp/tmp.FqGBdsCANH + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.H4TWaGa4jk ++ mktemp + local LAST_ERR=/tmp/tmp.bMk7JnH3V4 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1536/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.H4TWaGa4jk clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.bMk7JnH3V4 + rm /tmp/tmp.H4TWaGa4jk /tmp/tmp.bMk7JnH3V4 + return 0 + kubectl_bin delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.12.4/cert-manager.yaml namespace "cert-manager" deleted customresourcedefinition.apiextensions.k8s.io "certificaterequests.cert-manager.io" deleted customresourcedefinition.apiextensions.k8s.io "certificates.cert-manager.io" deleted customresourcedefinition.apiextensions.k8s.io "challenges.acme.cert-manager.io" deleted customresourcedefinition.apiextensions.k8s.io "clusterissuers.cert-manager.io" deleted customresourcedefinition.apiextensions.k8s.io "issuers.cert-manager.io" deleted customresourcedefinition.apiextensions.k8s.io "orders.acme.cert-manager.io" deleted serviceaccount "cert-manager-cainjector" deleted serviceaccount "cert-manager" deleted serviceaccount "cert-manager-webhook" deleted configmap "cert-manager-webhook" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-cainjector" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-issuers" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-certificates" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-orders" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-challenges" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-view" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-edit" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-cainjector" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-issuers" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-certificates" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-orders" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-challenges" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" deleted role.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" deleted role.rbac.authorization.k8s.io "cert-manager:leaderelection" deleted role.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" deleted rolebinding.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" deleted rolebinding.rbac.authorization.k8s.io "cert-manager:leaderelection" deleted mutatingwebhookconfiguration.admissionregistration.k8s.io "cert-manager-webhook" deleted validatingwebhookconfiguration.admissionregistration.k8s.io "cert-manager-webhook" deleted namespace "cert-manager" deleted + : + '[' -n '' ']' + '[' -n psmdb-operator ']' + kubectl_bin delete --grace-period=0 --force=true namespace tls-issue-cert-manager-19787 + rm -rf /tmp/tmp.aSxxw5JDFg + kubectl_bin delete --grace-period=0 --force=true namespace psmdb-operator ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.3p1654e9rH + desc 'test passed' + set +o xtrace ----------------------------------------------------------------------------------- test passed ----------------------------------------------------------------------------------- ++ mktemp + local LAST_OUT=/tmp/tmp.70hMMW7azZ ++ mktemp + local LAST_ERR=/tmp/tmp.u9B8fBGmxO + local exit_status=0 + local timeout=4 + local LAST_ERR=/tmp/tmp.VBVgfXNDeB + local exit_status=0 + local timeout=4 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace tls-issue-cert-manager-19787 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace psmdb-operator