Log: /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/logs/demand-backup-if-unhealthy.log Warning: version difference between client (1.35) and server (1.32) exceeds the supported minor version skew of +/-1 Warning: version difference between client (1.35) and server (1.32) exceeds the supported minor version skew of +/-1 Warning: version difference between client (1.35) and server (1.32) exceeds the supported minor version skew of +/-1 + create_infra demand-backup-if-unhealthy-26494 + local ns=demand-backup-if-unhealthy-26494 + [[ 1 == 1 ]] + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.iIJUWCwfX5 ++ mktemp + local LAST_ERR=/tmp/tmp.e4ljjuOwQm + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.iIJUWCwfX5 customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.e4ljjuOwQm + rm /tmp/tmp.iIJUWCwfX5 /tmp/tmp.e4ljjuOwQm + return 0 ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/crd.yaml ++ grep -v '\-\-\-' grep: warning: stray \ before - grep: warning: stray \ before - + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.5qbaN1joAM ++ mktemp + local LAST_ERR=/tmp/tmp.RWhPtjHGBo + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.5qbaN1joAM + cat /tmp/tmp.RWhPtjHGBo + rm /tmp/tmp.5qbaN1joAM /tmp/tmp.RWhPtjHGBo + return 0 + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.ZqSUHrPNsw ++ mktemp + local LAST_ERR=/tmp/tmp.IljHYk1jEN + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ZqSUHrPNsw + cat /tmp/tmp.IljHYk1jEN + rm /tmp/tmp.ZqSUHrPNsw /tmp/tmp.IljHYk1jEN + return 0 + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' No resources found + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: resource(s) were provided, but no name was specified + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.AlwYcsV1Cl ++ mktemp + local LAST_ERR=/tmp/tmp.ifoOarh5gU + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.AlwYcsV1Cl customresourcedefinition.apiextensions.k8s.io/perconaservermongodbs.psmdb.percona.com condition met + cat /tmp/tmp.ifoOarh5gU + rm /tmp/tmp.AlwYcsV1Cl /tmp/tmp.ifoOarh5gU + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.s3cY9rxfgp ++ mktemp + local LAST_ERR=/tmp/tmp.B8W62fiSHu + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.s3cY9rxfgp clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.B8W62fiSHu + rm /tmp/tmp.s3cY9rxfgp /tmp/tmp.B8W62fiSHu + return 0 + check_crd_for_deletion PR-2219-d7e802db + local git_tag=PR-2219-d7e802db ++ curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/PR-2219-d7e802db/deploy/crd.yaml ++ yq eval .metadata.name ++ /usr/sbin/sed s/---//g ++ /usr/sbin/sed ':a;N;$!ba;s/\n/ /g' + for crd_name in $(curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/${git_tag}/deploy/crd.yaml | yq eval '.metadata.name' | $sed 's/---//g' | $sed ':a;N;$!ba;s/\n/ /g') ++ kubectl_bin get crd/null -o 'jsonpath={.status.conditions[-1].type}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8NGrqYFYTJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.SNkcBlh3wb ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.8NGrqYFYTJ ++ cat /tmp/tmp.SNkcBlh3wb Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 0 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.8NGrqYFYTJ ++ cat /tmp/tmp.SNkcBlh3wb Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 4 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.8NGrqYFYTJ ++ cat /tmp/tmp.SNkcBlh3wb Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 8 ++ cat /tmp/tmp.8NGrqYFYTJ ++ cat /tmp/tmp.SNkcBlh3wb Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ rm /tmp/tmp.8NGrqYFYTJ /tmp/tmp.SNkcBlh3wb ++ return 1 + [[ '' == \T\e\r\m\i\n\a\t\i\n\g ]] + '[' -n psmdb-operator ']' + create_namespace psmdb-operator + local namespace=psmdb-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + grep -E -v '^kube-|^default|Terminating|psmdb-operator|openshift|^gke-|^gmp-|^NAME' + '[' -n '' ']' + desc 'cleaned up old namespaces psmdb-operator' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace psmdb-operator --ignore-not-found + awk '{print$1}' ++ mktemp ++ mktemp + xargs kubectl delete ns + local LAST_OUT=/tmp/tmp.Kp6bK1NXTp + local LAST_OUT=/tmp/tmp.vQ8iLtAWjU ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.3Cwe1RQrY9 + local exit_status=0 + local timeout=4 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.TGBUrh8rdN + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete namespace psmdb-operator --ignore-not-found + for i in $(seq 0 2) + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Kp6bK1NXTp + cat /tmp/tmp.TGBUrh8rdN + rm /tmp/tmp.Kp6bK1NXTp /tmp/tmp.TGBUrh8rdN + return 0 namespace "demand-backup-if-unhealthy-6996" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.vQ8iLtAWjU namespace "psmdb-operator" deleted + cat /tmp/tmp.3Cwe1RQrY9 + rm /tmp/tmp.vQ8iLtAWjU /tmp/tmp.3Cwe1RQrY9 + return 0 + kubectl_bin wait --for=delete namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.nGag8jNvDs ++ mktemp + local LAST_ERR=/tmp/tmp.9T4FnTpMLf + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.nGag8jNvDs + cat /tmp/tmp.9T4FnTpMLf + rm /tmp/tmp.nGag8jNvDs /tmp/tmp.9T4FnTpMLf + return 0 + desc 'create namespace psmdb-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.xxveyqHXGF ++ mktemp + local LAST_ERR=/tmp/tmp.PIxLEaH5g3 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl create namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xxveyqHXGF namespace/psmdb-operator created + cat /tmp/tmp.PIxLEaH5g3 + rm /tmp/tmp.xxveyqHXGF /tmp/tmp.PIxLEaH5g3 + return 0 + set_kube_ctx psmdb-operator + local namespace=psmdb-operator ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.AdqCZZvpjN +++ mktemp ++ local LAST_ERR=/tmp/tmp.oc8MzX1XOj ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.AdqCZZvpjN ++ cat /tmp/tmp.oc8MzX1XOj ++ rm /tmp/tmp.AdqCZZvpjN /tmp/tmp.oc8MzX1XOj ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-2219-d7e802db-7-cluster13 --namespace=psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.QSX2DwqYdm ++ mktemp + local LAST_ERR=/tmp/tmp.F3SshYMMZj + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-2219-d7e802db-7-cluster13 --namespace=psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.QSX2DwqYdm Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-2219-d7e802db-7-cluster13" modified. + cat /tmp/tmp.F3SshYMMZj + rm /tmp/tmp.QSX2DwqYdm /tmp/tmp.F3SshYMMZj + return 0 + deploy_operator + desc 'start PSMDB operator: docker.io/perconalab/percona-server-mongodb-operator:PR-2219-d7e802db' + set +o xtrace ----------------------------------------------------------------------------------- start PSMDB operator: docker.io/perconalab/percona-server-mongodb-operator:PR-2219-d7e802db ----------------------------------------------------------------------------------- + local cr_file + '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/conf/crd.yaml ']' + cr_file=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/crd.yaml + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.VwwBV0llAo ++ mktemp + local LAST_ERR=/tmp/tmp.pwePzssUas + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.VwwBV0llAo customresourcedefinition.apiextensions.k8s.io/perconaservermongodbbackups.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbrestores.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbs.psmdb.percona.com serverside-applied + cat /tmp/tmp.pwePzssUas + rm /tmp/tmp.VwwBV0llAo /tmp/tmp.pwePzssUas + return 0 + '[' -n psmdb-operator ']' + apply_rbac cw-rbac + local operator_namespace=psmdb-operator + local rbac=cw-rbac + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/cw-rbac.yaml + sed -e 's^namespace: .*^namespace: psmdb-operator^' + kubectl_bin apply -n psmdb-operator -f - ++ mktemp + local LAST_OUT=/tmp/tmp.7HG5Ubh6I4 ++ mktemp + local LAST_ERR=/tmp/tmp.1IOkDYDhPG + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -n psmdb-operator -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.7HG5Ubh6I4 clusterrole.rbac.authorization.k8s.io/percona-server-mongodb-operator created serviceaccount/percona-server-mongodb-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-server-mongodb-operator created + cat /tmp/tmp.1IOkDYDhPG + rm /tmp/tmp.7HG5Ubh6I4 /tmp/tmp.1IOkDYDhPG + return 0 + yq eval ' (.spec.template.spec.containers[].image = "docker.io/perconalab/percona-server-mongodb-operator:PR-2219-d7e802db") | ((.. | select(.[] == "DISABLE_TELEMETRY")) |= .value="true") | ((.. | select(.[] == "LOG_LEVEL")) |= .value="DEBUG")' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/cw-operator.yaml + kubectl_bin apply -n psmdb-operator -f - ++ mktemp + local LAST_OUT=/tmp/tmp.1MncK3esih ++ mktemp + local LAST_ERR=/tmp/tmp.mW0QprW8K9 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -n psmdb-operator -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.1MncK3esih deployment.apps/percona-server-mongodb-operator created + cat /tmp/tmp.mW0QprW8K9 + rm /tmp/tmp.1MncK3esih /tmp/tmp.mW0QprW8K9 + return 0 + sleep 20 ++ get_operator_pod ++ kubectl_bin get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.vsVIWIP7AT +++ mktemp ++ local LAST_ERR=/tmp/tmp.NYEml4hRFU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vsVIWIP7AT ++ cat /tmp/tmp.NYEml4hRFU ++ rm /tmp/tmp.vsVIWIP7AT /tmp/tmp.NYEml4hRFU ++ return 0 + wait_operator_pod percona-server-mongodb-operator-76758dcf9-frh8r + local pod=percona-server-mongodb-operator-76758dcf9-frh8r + set +o xtrace waiting for pod/percona-server-mongodb-operator-76758dcf9-frh8r to be ready.OK + echo 'Print operator info from log' Print operator info from log + grep 'Manager starting up' ++ get_operator_pod ++ kubectl_bin get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.fnyPI1iS4C +++ mktemp ++ local LAST_ERR=/tmp/tmp.f1IycjVKff ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fnyPI1iS4C ++ cat /tmp/tmp.f1IycjVKff ++ rm /tmp/tmp.fnyPI1iS4C /tmp/tmp.f1IycjVKff ++ return 0 + kubectl_bin logs -n psmdb-operator percona-server-mongodb-operator-76758dcf9-frh8r ++ mktemp + local LAST_OUT=/tmp/tmp.e2KBQHkjRT ++ mktemp + local LAST_ERR=/tmp/tmp.k080ose1Vj + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl logs -n psmdb-operator percona-server-mongodb-operator-76758dcf9-frh8r + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.e2KBQHkjRT + cat /tmp/tmp.k080ose1Vj + rm /tmp/tmp.e2KBQHkjRT /tmp/tmp.k080ose1Vj + return 0 2026-03-10T21:52:44.579Z INFO setup Manager starting up {"gitCommit": "d7e802db10c9b2b2028f56c7b5227cb276fe5878", "gitBranch": "PR-2219-d7e802db", "buildTime": "", "goVersion": "go1.25.8", "os": "linux", "arch": "amd64"} + create_namespace demand-backup-if-unhealthy-26494 + local namespace=demand-backup-if-unhealthy-26494 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + grep -E -v '^kube-|^default|Terminating|psmdb-operator|openshift|^gke-|^gmp-|^NAME' + awk '{print$1}' + xargs kubectl delete ns ++ mktemp + '[' -n '' ']' + desc 'cleaned up old namespaces demand-backup-if-unhealthy-26494' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces demand-backup-if-unhealthy-26494+ local LAST_OUT=/tmp/tmp.ppxaYZwl1V ----------------------------------------------------------------------------------- + kubectl_bin delete namespace demand-backup-if-unhealthy-26494 --ignore-not-found ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.VUqecmTBm6 ++ mktemp + local LAST_ERR=/tmp/tmp.DsgAvPuabb + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get ns + local LAST_ERR=/tmp/tmp.SrYQUesT0i + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete namespace demand-backup-if-unhealthy-26494 --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ppxaYZwl1V + cat /tmp/tmp.DsgAvPuabb + rm /tmp/tmp.ppxaYZwl1V /tmp/tmp.DsgAvPuabb + return 0 error: resource(s) were provided, but no name was specified + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.VUqecmTBm6 + cat /tmp/tmp.SrYQUesT0i + rm /tmp/tmp.VUqecmTBm6 /tmp/tmp.SrYQUesT0i + return 0 + kubectl_bin wait --for=delete namespace demand-backup-if-unhealthy-26494 ++ mktemp + local LAST_OUT=/tmp/tmp.51ynMj8jOU ++ mktemp + local LAST_ERR=/tmp/tmp.VfVcQd9PVJ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete namespace demand-backup-if-unhealthy-26494 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.51ynMj8jOU + cat /tmp/tmp.VfVcQd9PVJ + rm /tmp/tmp.51ynMj8jOU /tmp/tmp.VfVcQd9PVJ + return 0 + desc 'create namespace demand-backup-if-unhealthy-26494' + set +o xtrace ----------------------------------------------------------------------------------- create namespace demand-backup-if-unhealthy-26494 ----------------------------------------------------------------------------------- + kubectl_bin create namespace demand-backup-if-unhealthy-26494 ++ mktemp + local LAST_OUT=/tmp/tmp.rEdViK2MZB ++ mktemp + local LAST_ERR=/tmp/tmp.26eRZeyWRp + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl create namespace demand-backup-if-unhealthy-26494 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.rEdViK2MZB namespace/demand-backup-if-unhealthy-26494 created + cat /tmp/tmp.26eRZeyWRp + rm /tmp/tmp.rEdViK2MZB /tmp/tmp.26eRZeyWRp + return 0 + set_kube_ctx demand-backup-if-unhealthy-26494 + local namespace=demand-backup-if-unhealthy-26494 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.1cGDloFcp9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.3L54muOLaD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.1cGDloFcp9 ++ cat /tmp/tmp.3L54muOLaD ++ rm /tmp/tmp.1cGDloFcp9 /tmp/tmp.3L54muOLaD ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-2219-d7e802db-7-cluster13 --namespace=demand-backup-if-unhealthy-26494 ++ mktemp + local LAST_OUT=/tmp/tmp.C8QJGJtatI ++ mktemp + local LAST_ERR=/tmp/tmp.bZ7xSqLi88 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-2219-d7e802db-7-cluster13 --namespace=demand-backup-if-unhealthy-26494 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.C8QJGJtatI Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-2219-d7e802db-7-cluster13" modified. + cat /tmp/tmp.bZ7xSqLi88 + rm /tmp/tmp.C8QJGJtatI /tmp/tmp.bZ7xSqLi88 + return 0 + deploy_minio + local cert_secret= + local service_name=minio-service + desc 'install MinIO: minio-service' + set +o xtrace ----------------------------------------------------------------------------------- install MinIO: minio-service ----------------------------------------------------------------------------------- + helm uninstall minio-service + : + helm repo remove minio "minio" has been removed from your repositories + helm repo add minio https://charts.min.io/ "minio" has been added to your repositories + local endpoint=http://minio-service:9000 + minio_args=('--version' '5.4.0' '--set' 'replicas=1' '--set' 'mode=standalone' '--set' 'resources.requests.memory=256Mi' '--set' 'rootUser=rootuser' '--set' 'rootPassword=rootpass123' '--set' 'users[0].accessKey=some-access-key' '--set' 'users[0].secretKey=some-secret-key' '--set' 'users[0].policy=consoleAdmin' '--set' 'service.type=ClusterIP' '--set' 'configPathmc=/tmp/' '--set' 'securityContext.enabled=false' '--set' 'persistence.size=2G' '--set' 'fullnameOverride=minio-service' '--set' 'serviceAccount.create=true' '--set' 'serviceAccount.name=minio-service-sa') + local minio_args + [[ -n '' ]] + retry 10 60 helm install minio-service --version 5.4.0 --set replicas=1 --set mode=standalone --set resources.requests.memory=256Mi --set rootUser=rootuser --set rootPassword=rootpass123 --set 'users[0].accessKey=some-access-key' --set 'users[0].secretKey=some-secret-key' --set 'users[0].policy=consoleAdmin' --set service.type=ClusterIP --set configPathmc=/tmp/ --set securityContext.enabled=false --set persistence.size=2G --set fullnameOverride=minio-service --set serviceAccount.create=true --set serviceAccount.name=minio-service-sa minio/minio + local max=10 + local delay=60 + shift 2 + local n=1 + helm install minio-service --version 5.4.0 --set replicas=1 --set mode=standalone --set resources.requests.memory=256Mi --set rootUser=rootuser --set rootPassword=rootpass123 --set 'users[0].accessKey=some-access-key' --set 'users[0].secretKey=some-secret-key' --set 'users[0].policy=consoleAdmin' --set service.type=ClusterIP --set configPathmc=/tmp/ --set securityContext.enabled=false --set persistence.size=2G --set fullnameOverride=minio-service --set serviceAccount.create=true --set serviceAccount.name=minio-service-sa minio/minio NAME: minio-service LAST DEPLOYED: Tue Mar 10 21:53:17 2026 NAMESPACE: demand-backup-if-unhealthy-26494 STATUS: deployed REVISION: 1 TEST SUITE: None NOTES: MinIO can be accessed via port 9000 on the following DNS name from within your cluster: minio-service.demand-backup-if-unhealthy-26494.cluster.local To access MinIO from localhost, run the below commands: 1. export POD_NAME=$(kubectl get pods --namespace demand-backup-if-unhealthy-26494 -l "release=minio-service" -o jsonpath="{.items[0].metadata.name}") 2. kubectl port-forward $POD_NAME 9000 --namespace demand-backup-if-unhealthy-26494 Read more about port forwarding here: http://kubernetes.io/docs/user-guide/kubectl/kubectl_port-forward/ You can now access MinIO server on http://localhost:9000. Follow the below steps to connect to MinIO server with mc client: 1. Download the MinIO mc client - https://min.io/docs/minio/linux/reference/minio-mc.html#quickstart 2. export MC_HOST_minio-service-local=http://$(kubectl get secret --namespace demand-backup-if-unhealthy-26494 minio-service -o jsonpath="{.data.rootUser}" | base64 --decode):$(kubectl get secret --namespace demand-backup-if-unhealthy-26494 minio-service -o jsonpath="{.data.rootPassword}" | base64 --decode)@localhost:9000 3. mc ls minio-service-local ++ kubectl_bin get pods --selector=release=minio-service -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8gy9a4ke0N +++ mktemp ++ local LAST_ERR=/tmp/tmp.P6RqpckFfa ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=release=minio-service -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8gy9a4ke0N ++ cat /tmp/tmp.P6RqpckFfa ++ rm /tmp/tmp.8gy9a4ke0N /tmp/tmp.P6RqpckFfa ++ return 0 + local MINIO_POD=minio-service-6d5f646cdc-4f4rf + wait_pod minio-service-6d5f646cdc-4f4rf + local pod=minio-service-6d5f646cdc-4f4rf + set +o xtrace waiting for pod/minio-service-6d5f646cdc-4f4rf to be ready.OK + '[' -n psmdb-operator ']' + kubectl_bin create svc -n psmdb-operator externalname minio-service --external-name=minio-service.demand-backup-if-unhealthy-26494.svc.cluster.local --tcp=9000 service/minio-service created + create_minio_bucket operator-testing http://minio-service:9000 + local bucket=operator-testing + local endpoint=http://minio-service:9000 + kubectl_bin run -i --rm aws-cli --image=docker.io/perconalab/awscli --restart=Never -- bash -c 'AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --no-verify-ssl --endpoint-url http://minio-service:9000 s3 mb s3://operator-testing' ++ mktemp + local LAST_OUT=/tmp/tmp.xpR0ctBRo3 ++ mktemp + local LAST_ERR=/tmp/tmp.GWEvM6aokW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl run -i --rm aws-cli --image=docker.io/perconalab/awscli --restart=Never -- bash -c 'AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --no-verify-ssl --endpoint-url http://minio-service:9000 s3 mb s3://operator-testing' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xpR0ctBRo3 pod "aws-cli" deleted from demand-backup-if-unhealthy-26494 namespace + cat /tmp/tmp.GWEvM6aokW All commands and output from this session will be recorded in container logs, including credentials and sensitive information passed through the command prompt. If you don't see a command prompt, try pressing enter. + rm /tmp/tmp.xpR0ctBRo3 /tmp/tmp.GWEvM6aokW + return 0 + create_secrets + echo 'Creating secrets and start client' Creating secrets and start client + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/conf/secrets.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/conf/client.yml ++ mktemp + local LAST_OUT=/tmp/tmp.hpLb1A5typ ++ mktemp + local LAST_ERR=/tmp/tmp.rwKr6lSBYD + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/conf/secrets.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/conf/client.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.hpLb1A5typ secret/some-users created deployment.apps/psmdb-client created + cat /tmp/tmp.rwKr6lSBYD + rm /tmp/tmp.hpLb1A5typ /tmp/tmp.rwKr6lSBYD + return 0 + apply_s3_storage_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.F4kz1c5M8v ++ mktemp + local LAST_ERR=/tmp/tmp.vW01vpJyYw + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.F4kz1c5M8v secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created secret/gcp-cs-sa-key-secret created + cat /tmp/tmp.vW01vpJyYw + rm /tmp/tmp.F4kz1c5M8v /tmp/tmp.vW01vpJyYw + return 0 + cluster=some-name + desc 'create PSMDB cluster some-name' + set +o xtrace ----------------------------------------------------------------------------------- create PSMDB cluster some-name ----------------------------------------------------------------------------------- + apply_cluster /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/conf/some-name.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/conf/some-name.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/conf/some-name.yml ++ mktemp + yq eval '(.spec | select(.image == null)).image = "docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0"' + yq eval '(.spec | select(has("pmm"))).pmm.image = "docker.io/percona/pmm-client:2.44.1-1"' + yq eval '(.spec | select(has("initImage"))).initImage = "docker.io/perconalab/percona-server-mongodb-operator:PR-2219-d7e802db"' + local LAST_OUT=/tmp/tmp.5R5LMUbhUH ++ mktemp + local LAST_ERR=/tmp/tmp.BInkA9uynw + local exit_status=0 + local timeout=4 ++ seq 0 2 + /usr/sbin/sed -e s/NAME_SPACE/demand-backup-if-unhealthy-26494/g + yq eval '.spec.upgradeOptions.apply="Never"' + for i in $(seq 0 2) + set +e + kubectl apply -f - + yq eval '(.spec | select(has("backup"))).backup.image = "docker.io/perconalab/percona-server-mongodb-operator:main-backup"' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.5R5LMUbhUH perconaservermongodb.psmdb.percona.com/some-name created + cat /tmp/tmp.BInkA9uynw + rm /tmp/tmp.5R5LMUbhUH /tmp/tmp.BInkA9uynw + return 0 + wait_for_cluster_state some-name ready + local cluster_name=some-name + local target_state=ready + echo -n 'Waiting for psmdb/some-name to reach ready state' Waiting for psmdb/some-name to reach ready state+ local timeout=0 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.crPQmlUX9L +++ mktemp ++ local LAST_ERR=/tmp/tmp.nDPXXjJnHG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.crPQmlUX9L ++ cat /tmp/tmp.nDPXXjJnHG ++ rm /tmp/tmp.crPQmlUX9L /tmp/tmp.nDPXXjJnHG ++ return 0 + [[ '' =~ ready ]] + sleep 1 + timeout=1 + echo -n . .+ [[ 1 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WIXzxA85TR +++ mktemp ++ local LAST_ERR=/tmp/tmp.O6bG6Y6HFW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.WIXzxA85TR ++ cat /tmp/tmp.O6bG6Y6HFW ++ rm /tmp/tmp.WIXzxA85TR /tmp/tmp.O6bG6Y6HFW ++ return 0 + [[ '' =~ ready ]] + sleep 1 + timeout=2 + echo -n . .+ [[ 2 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.iMBbiuKASJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.qL2SLdgrue ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.iMBbiuKASJ ++ cat /tmp/tmp.qL2SLdgrue ++ rm /tmp/tmp.iMBbiuKASJ /tmp/tmp.qL2SLdgrue ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=3 + echo -n . .+ [[ 3 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ElTbymIznM +++ mktemp ++ local LAST_ERR=/tmp/tmp.ICCt06JaNA ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ElTbymIznM ++ cat /tmp/tmp.ICCt06JaNA ++ rm /tmp/tmp.ElTbymIznM /tmp/tmp.ICCt06JaNA ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=4 + echo -n . .+ [[ 4 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2NORNC8TBM +++ mktemp ++ local LAST_ERR=/tmp/tmp.CQarRiqcil ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2NORNC8TBM ++ cat /tmp/tmp.CQarRiqcil ++ rm /tmp/tmp.2NORNC8TBM /tmp/tmp.CQarRiqcil ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=5 + echo -n . .+ [[ 5 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fQkorOmCYS +++ mktemp ++ local LAST_ERR=/tmp/tmp.u7BFyUXALK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fQkorOmCYS ++ cat /tmp/tmp.u7BFyUXALK ++ rm /tmp/tmp.fQkorOmCYS /tmp/tmp.u7BFyUXALK ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=6 + echo -n . .+ [[ 6 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vTAG7PMI4c +++ mktemp ++ local LAST_ERR=/tmp/tmp.xjpROs6Lsp ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vTAG7PMI4c ++ cat /tmp/tmp.xjpROs6Lsp ++ rm /tmp/tmp.vTAG7PMI4c /tmp/tmp.xjpROs6Lsp ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=7 + echo -n . .+ [[ 7 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.a5oAAX2WjY +++ mktemp ++ local LAST_ERR=/tmp/tmp.m2RjULEizi ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.a5oAAX2WjY ++ cat /tmp/tmp.m2RjULEizi ++ rm /tmp/tmp.a5oAAX2WjY /tmp/tmp.m2RjULEizi ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=8 + echo -n . .+ [[ 8 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EaZlSYsEn9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.H1Kz4z1eQm ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.EaZlSYsEn9 ++ cat /tmp/tmp.H1Kz4z1eQm ++ rm /tmp/tmp.EaZlSYsEn9 /tmp/tmp.H1Kz4z1eQm ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=9 + echo -n . .+ [[ 9 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YoCnJ8f88p +++ mktemp ++ local LAST_ERR=/tmp/tmp.6xTRSbCuzV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.YoCnJ8f88p ++ cat /tmp/tmp.6xTRSbCuzV ++ rm /tmp/tmp.YoCnJ8f88p /tmp/tmp.6xTRSbCuzV ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=10 + echo -n . .+ [[ 10 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JdxZXDkLd3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Zb5We09tps ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.JdxZXDkLd3 ++ cat /tmp/tmp.Zb5We09tps ++ rm /tmp/tmp.JdxZXDkLd3 /tmp/tmp.Zb5We09tps ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=11 + echo -n . .+ [[ 11 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.E1OwwYkmhv +++ mktemp ++ local LAST_ERR=/tmp/tmp.Vswo4aqzYp ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.E1OwwYkmhv ++ cat /tmp/tmp.Vswo4aqzYp ++ rm /tmp/tmp.E1OwwYkmhv /tmp/tmp.Vswo4aqzYp ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=12 + echo -n . .+ [[ 12 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.RQPzw1QW7l +++ mktemp ++ local LAST_ERR=/tmp/tmp.667AsZeRxq ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.RQPzw1QW7l ++ cat /tmp/tmp.667AsZeRxq ++ rm /tmp/tmp.RQPzw1QW7l /tmp/tmp.667AsZeRxq ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=13 + echo -n . .+ [[ 13 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.RcdQRV5h0H +++ mktemp ++ local LAST_ERR=/tmp/tmp.OIVLhWf0dK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.RcdQRV5h0H ++ cat /tmp/tmp.OIVLhWf0dK ++ rm /tmp/tmp.RcdQRV5h0H /tmp/tmp.OIVLhWf0dK ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=14 + echo -n . .+ [[ 14 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VtqT4CPatg +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZTATfiYimO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.VtqT4CPatg ++ cat /tmp/tmp.ZTATfiYimO ++ rm /tmp/tmp.VtqT4CPatg /tmp/tmp.ZTATfiYimO ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=15 + echo -n . .+ [[ 15 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.NnZzLoD6VU +++ mktemp ++ local LAST_ERR=/tmp/tmp.GUUd9bQqK8 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.NnZzLoD6VU ++ cat /tmp/tmp.GUUd9bQqK8 ++ rm /tmp/tmp.NnZzLoD6VU /tmp/tmp.GUUd9bQqK8 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=16 + echo -n . .+ [[ 16 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mYMs2Fasgo +++ mktemp ++ local LAST_ERR=/tmp/tmp.QtIP3XjWKK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.mYMs2Fasgo ++ cat /tmp/tmp.QtIP3XjWKK ++ rm /tmp/tmp.mYMs2Fasgo /tmp/tmp.QtIP3XjWKK ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=17 + echo -n . .+ [[ 17 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yn4UtoIK6N +++ mktemp ++ local LAST_ERR=/tmp/tmp.n934iXmV4R ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yn4UtoIK6N ++ cat /tmp/tmp.n934iXmV4R ++ rm /tmp/tmp.yn4UtoIK6N /tmp/tmp.n934iXmV4R ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=18 + echo -n . .+ [[ 18 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Dq7TK4XaYA +++ mktemp ++ local LAST_ERR=/tmp/tmp.sEt0UPeSC7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Dq7TK4XaYA ++ cat /tmp/tmp.sEt0UPeSC7 ++ rm /tmp/tmp.Dq7TK4XaYA /tmp/tmp.sEt0UPeSC7 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=19 + echo -n . .+ [[ 19 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TKh8eZEnmj +++ mktemp ++ local LAST_ERR=/tmp/tmp.89UCnyULA0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.TKh8eZEnmj ++ cat /tmp/tmp.89UCnyULA0 ++ rm /tmp/tmp.TKh8eZEnmj /tmp/tmp.89UCnyULA0 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=20 + echo -n . .+ [[ 20 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.y5ymEMBT23 +++ mktemp ++ local LAST_ERR=/tmp/tmp.FfJgunEenS ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.y5ymEMBT23 ++ cat /tmp/tmp.FfJgunEenS ++ rm /tmp/tmp.y5ymEMBT23 /tmp/tmp.FfJgunEenS ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=21 + echo -n . .+ [[ 21 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.01OX0wA75e +++ mktemp ++ local LAST_ERR=/tmp/tmp.Pk5F16Lpur ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.01OX0wA75e ++ cat /tmp/tmp.Pk5F16Lpur ++ rm /tmp/tmp.01OX0wA75e /tmp/tmp.Pk5F16Lpur ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=22 + echo -n . .+ [[ 22 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8dTz0Xn4Tx +++ mktemp ++ local LAST_ERR=/tmp/tmp.5TLlPlFDJb ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8dTz0Xn4Tx ++ cat /tmp/tmp.5TLlPlFDJb ++ rm /tmp/tmp.8dTz0Xn4Tx /tmp/tmp.5TLlPlFDJb ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=23 + echo -n . .+ [[ 23 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KlwJT9p5cs +++ mktemp ++ local LAST_ERR=/tmp/tmp.Im8PEVcBtV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.KlwJT9p5cs ++ cat /tmp/tmp.Im8PEVcBtV ++ rm /tmp/tmp.KlwJT9p5cs /tmp/tmp.Im8PEVcBtV ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=24 + echo -n . .+ [[ 24 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6UjS5VP9qa +++ mktemp ++ local LAST_ERR=/tmp/tmp.B6tYcS8Uqb ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.6UjS5VP9qa ++ cat /tmp/tmp.B6tYcS8Uqb ++ rm /tmp/tmp.6UjS5VP9qa /tmp/tmp.B6tYcS8Uqb ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=25 + echo -n . .+ [[ 25 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8dmV7jpvAd +++ mktemp ++ local LAST_ERR=/tmp/tmp.G5vkcrD6Es ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8dmV7jpvAd ++ cat /tmp/tmp.G5vkcrD6Es ++ rm /tmp/tmp.8dmV7jpvAd /tmp/tmp.G5vkcrD6Es ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=26 + echo -n . .+ [[ 26 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lNn3R4irPl +++ mktemp ++ local LAST_ERR=/tmp/tmp.PPAcss9Fz9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lNn3R4irPl ++ cat /tmp/tmp.PPAcss9Fz9 ++ rm /tmp/tmp.lNn3R4irPl /tmp/tmp.PPAcss9Fz9 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=27 + echo -n . .+ [[ 27 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3AnQbDnAwS +++ mktemp ++ local LAST_ERR=/tmp/tmp.qShqzQouzQ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3AnQbDnAwS ++ cat /tmp/tmp.qShqzQouzQ ++ rm /tmp/tmp.3AnQbDnAwS /tmp/tmp.qShqzQouzQ ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=28 + echo -n . .+ [[ 28 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xW7p16sjuj +++ mktemp ++ local LAST_ERR=/tmp/tmp.VEGQYclL0v ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xW7p16sjuj ++ cat /tmp/tmp.VEGQYclL0v ++ rm /tmp/tmp.xW7p16sjuj /tmp/tmp.VEGQYclL0v ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=29 + echo -n . .+ [[ 29 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uAZBGYrmB8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Dt3OjjPxxg ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.uAZBGYrmB8 ++ cat /tmp/tmp.Dt3OjjPxxg ++ rm /tmp/tmp.uAZBGYrmB8 /tmp/tmp.Dt3OjjPxxg ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=30 + echo -n . .+ [[ 30 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.46xHQwe80u +++ mktemp ++ local LAST_ERR=/tmp/tmp.wfhTsXGD9Z ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.46xHQwe80u ++ cat /tmp/tmp.wfhTsXGD9Z ++ rm /tmp/tmp.46xHQwe80u /tmp/tmp.wfhTsXGD9Z ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=31 + echo -n . .+ [[ 31 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.J6lPVfOaOk +++ mktemp ++ local LAST_ERR=/tmp/tmp.11XLYb3IXv ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.J6lPVfOaOk ++ cat /tmp/tmp.11XLYb3IXv ++ rm /tmp/tmp.J6lPVfOaOk /tmp/tmp.11XLYb3IXv ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=32 + echo -n . .+ [[ 32 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dee8HEGm96 +++ mktemp ++ local LAST_ERR=/tmp/tmp.SbfTjoA954 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.dee8HEGm96 ++ cat /tmp/tmp.SbfTjoA954 ++ rm /tmp/tmp.dee8HEGm96 /tmp/tmp.SbfTjoA954 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=33 + echo -n . .+ [[ 33 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cPReST9GI4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.1r3zRhJLu4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.cPReST9GI4 ++ cat /tmp/tmp.1r3zRhJLu4 ++ rm /tmp/tmp.cPReST9GI4 /tmp/tmp.1r3zRhJLu4 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=34 + echo -n . .+ [[ 34 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.sLBLwkjsu0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.RVPKKK4ofc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.sLBLwkjsu0 ++ cat /tmp/tmp.RVPKKK4ofc ++ rm /tmp/tmp.sLBLwkjsu0 /tmp/tmp.RVPKKK4ofc ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=35 + echo -n . .+ [[ 35 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XmBoD2F27a +++ mktemp ++ local LAST_ERR=/tmp/tmp.wx4RklsImO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XmBoD2F27a ++ cat /tmp/tmp.wx4RklsImO ++ rm /tmp/tmp.XmBoD2F27a /tmp/tmp.wx4RklsImO ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=36 + echo -n . .+ [[ 36 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qfmOkSlfeG +++ mktemp ++ local LAST_ERR=/tmp/tmp.u0uQBymyF0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.qfmOkSlfeG ++ cat /tmp/tmp.u0uQBymyF0 ++ rm /tmp/tmp.qfmOkSlfeG /tmp/tmp.u0uQBymyF0 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=37 + echo -n . .+ [[ 37 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.RwaOnjOmtt +++ mktemp ++ local LAST_ERR=/tmp/tmp.NuJ0UoDnvq ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.RwaOnjOmtt ++ cat /tmp/tmp.NuJ0UoDnvq ++ rm /tmp/tmp.RwaOnjOmtt /tmp/tmp.NuJ0UoDnvq ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=38 + echo -n . .+ [[ 38 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MRczGfH3ZA +++ mktemp ++ local LAST_ERR=/tmp/tmp.m3N877t72X ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.MRczGfH3ZA ++ cat /tmp/tmp.m3N877t72X ++ rm /tmp/tmp.MRczGfH3ZA /tmp/tmp.m3N877t72X ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=39 + echo -n . .+ [[ 39 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xGBcoMZtrI +++ mktemp ++ local LAST_ERR=/tmp/tmp.q0IO9S0q47 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xGBcoMZtrI ++ cat /tmp/tmp.q0IO9S0q47 ++ rm /tmp/tmp.xGBcoMZtrI /tmp/tmp.q0IO9S0q47 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=40 + echo -n . .+ [[ 40 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dYQJrNb7Pf +++ mktemp ++ local LAST_ERR=/tmp/tmp.G0qCTo82dg ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.dYQJrNb7Pf ++ cat /tmp/tmp.G0qCTo82dg ++ rm /tmp/tmp.dYQJrNb7Pf /tmp/tmp.G0qCTo82dg ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=41 + echo -n . .+ [[ 41 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Q4z5rEk4rs +++ mktemp ++ local LAST_ERR=/tmp/tmp.isK6uTMWKn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Q4z5rEk4rs ++ cat /tmp/tmp.isK6uTMWKn ++ rm /tmp/tmp.Q4z5rEk4rs /tmp/tmp.isK6uTMWKn ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=42 + echo -n . .+ [[ 42 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KKYu37QZ6i +++ mktemp ++ local LAST_ERR=/tmp/tmp.A7bElQHRRc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.KKYu37QZ6i ++ cat /tmp/tmp.A7bElQHRRc ++ rm /tmp/tmp.KKYu37QZ6i /tmp/tmp.A7bElQHRRc ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=43 + echo -n . .+ [[ 43 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.C4PE5JujRZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.L2Oh2vqyAM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.C4PE5JujRZ ++ cat /tmp/tmp.L2Oh2vqyAM ++ rm /tmp/tmp.C4PE5JujRZ /tmp/tmp.L2Oh2vqyAM ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=44 + echo -n . .+ [[ 44 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BUQuTkZdZb +++ mktemp ++ local LAST_ERR=/tmp/tmp.jeHBpIOqdB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.BUQuTkZdZb ++ cat /tmp/tmp.jeHBpIOqdB ++ rm /tmp/tmp.BUQuTkZdZb /tmp/tmp.jeHBpIOqdB ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=45 + echo -n . .+ [[ 45 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.04fN9mTC2j +++ mktemp ++ local LAST_ERR=/tmp/tmp.Mfkk4SDh89 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.04fN9mTC2j ++ cat /tmp/tmp.Mfkk4SDh89 ++ rm /tmp/tmp.04fN9mTC2j /tmp/tmp.Mfkk4SDh89 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=46 + echo -n . .+ [[ 46 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OUlkgx1l94 +++ mktemp ++ local LAST_ERR=/tmp/tmp.lCBIWHBDd6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OUlkgx1l94 ++ cat /tmp/tmp.lCBIWHBDd6 ++ rm /tmp/tmp.OUlkgx1l94 /tmp/tmp.lCBIWHBDd6 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=47 + echo -n . .+ [[ 47 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZtmD5Wowug +++ mktemp ++ local LAST_ERR=/tmp/tmp.RtVlyfif1j ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZtmD5Wowug ++ cat /tmp/tmp.RtVlyfif1j ++ rm /tmp/tmp.ZtmD5Wowug /tmp/tmp.RtVlyfif1j ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=48 + echo -n . .+ [[ 48 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HnTMFBOyR2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.LSiZGRPx2V ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HnTMFBOyR2 ++ cat /tmp/tmp.LSiZGRPx2V ++ rm /tmp/tmp.HnTMFBOyR2 /tmp/tmp.LSiZGRPx2V ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=49 + echo -n . .+ [[ 49 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2F7Wg5eT5w +++ mktemp ++ local LAST_ERR=/tmp/tmp.gFBiS3hXfo ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2F7Wg5eT5w ++ cat /tmp/tmp.gFBiS3hXfo ++ rm /tmp/tmp.2F7Wg5eT5w /tmp/tmp.gFBiS3hXfo ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=50 + echo -n . .+ [[ 50 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8qpern1oo8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.PmSeiWKSav ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8qpern1oo8 ++ cat /tmp/tmp.PmSeiWKSav ++ rm /tmp/tmp.8qpern1oo8 /tmp/tmp.PmSeiWKSav ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=51 + echo -n . .+ [[ 51 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VeS8Vkk4dJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.DxRftgsazE ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.VeS8Vkk4dJ ++ cat /tmp/tmp.DxRftgsazE ++ rm /tmp/tmp.VeS8Vkk4dJ /tmp/tmp.DxRftgsazE ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=52 + echo -n . .+ [[ 52 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YRMxYkOmo0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.dxVqXUxHC0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.YRMxYkOmo0 ++ cat /tmp/tmp.dxVqXUxHC0 ++ rm /tmp/tmp.YRMxYkOmo0 /tmp/tmp.dxVqXUxHC0 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=53 + echo -n . .+ [[ 53 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uJ8wLTb40i +++ mktemp ++ local LAST_ERR=/tmp/tmp.q9p2tZk8JN ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.uJ8wLTb40i ++ cat /tmp/tmp.q9p2tZk8JN ++ rm /tmp/tmp.uJ8wLTb40i /tmp/tmp.q9p2tZk8JN ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=54 + echo -n . .+ [[ 54 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vIVcOE2uYT +++ mktemp ++ local LAST_ERR=/tmp/tmp.FqiWbPOyTy ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vIVcOE2uYT ++ cat /tmp/tmp.FqiWbPOyTy ++ rm /tmp/tmp.vIVcOE2uYT /tmp/tmp.FqiWbPOyTy ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=55 + echo -n . .+ [[ 55 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hb6LqA2omj +++ mktemp ++ local LAST_ERR=/tmp/tmp.d8VsG6MVLO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hb6LqA2omj ++ cat /tmp/tmp.d8VsG6MVLO ++ rm /tmp/tmp.hb6LqA2omj /tmp/tmp.d8VsG6MVLO ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=56 + echo -n . .+ [[ 56 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9GnqBz9GeA +++ mktemp ++ local LAST_ERR=/tmp/tmp.s7R3t5zyFa ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.9GnqBz9GeA ++ cat /tmp/tmp.s7R3t5zyFa ++ rm /tmp/tmp.9GnqBz9GeA /tmp/tmp.s7R3t5zyFa ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=57 + echo -n . .+ [[ 57 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5lPNDDvI4t +++ mktemp ++ local LAST_ERR=/tmp/tmp.FsFau14N8I ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.5lPNDDvI4t ++ cat /tmp/tmp.FsFau14N8I ++ rm /tmp/tmp.5lPNDDvI4t /tmp/tmp.FsFau14N8I ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=58 + echo -n . .+ [[ 58 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6lBIh4IL3Z +++ mktemp ++ local LAST_ERR=/tmp/tmp.oaiMQBgDi6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.6lBIh4IL3Z ++ cat /tmp/tmp.oaiMQBgDi6 ++ rm /tmp/tmp.6lBIh4IL3Z /tmp/tmp.oaiMQBgDi6 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=59 + echo -n . .+ [[ 59 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0ftn0xThC0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Txvli9TSE5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.0ftn0xThC0 ++ cat /tmp/tmp.Txvli9TSE5 ++ rm /tmp/tmp.0ftn0xThC0 /tmp/tmp.Txvli9TSE5 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=60 + echo -n . .+ [[ 60 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YaqafgFOk5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.vlXOeBXWHw ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.YaqafgFOk5 ++ cat /tmp/tmp.vlXOeBXWHw ++ rm /tmp/tmp.YaqafgFOk5 /tmp/tmp.vlXOeBXWHw ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=61 + echo -n . .+ [[ 61 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5D8KjAELKb +++ mktemp ++ local LAST_ERR=/tmp/tmp.w1ckME4mHl ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.5D8KjAELKb ++ cat /tmp/tmp.w1ckME4mHl ++ rm /tmp/tmp.5D8KjAELKb /tmp/tmp.w1ckME4mHl ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=62 + echo -n . .+ [[ 62 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.sJ8Uq7W8dJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.MrHSh6j3q2 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.sJ8Uq7W8dJ ++ cat /tmp/tmp.MrHSh6j3q2 ++ rm /tmp/tmp.sJ8Uq7W8dJ /tmp/tmp.MrHSh6j3q2 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=63 + echo -n . .+ [[ 63 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.y3r6E62pSw +++ mktemp ++ local LAST_ERR=/tmp/tmp.VwcwQrEM1l ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.y3r6E62pSw ++ cat /tmp/tmp.VwcwQrEM1l ++ rm /tmp/tmp.y3r6E62pSw /tmp/tmp.VwcwQrEM1l ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=64 + echo -n . .+ [[ 64 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9upbGbK3Q0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.XKC0NsKmBk ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.9upbGbK3Q0 ++ cat /tmp/tmp.XKC0NsKmBk ++ rm /tmp/tmp.9upbGbK3Q0 /tmp/tmp.XKC0NsKmBk ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=65 + echo -n . .+ [[ 65 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xl52dO6L2i +++ mktemp ++ local LAST_ERR=/tmp/tmp.Nq99qAmzbD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xl52dO6L2i ++ cat /tmp/tmp.Nq99qAmzbD ++ rm /tmp/tmp.xl52dO6L2i /tmp/tmp.Nq99qAmzbD ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=66 + echo -n . .+ [[ 66 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.W0nWCDggKj +++ mktemp ++ local LAST_ERR=/tmp/tmp.GOuOLg2NgN ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.W0nWCDggKj ++ cat /tmp/tmp.GOuOLg2NgN ++ rm /tmp/tmp.W0nWCDggKj /tmp/tmp.GOuOLg2NgN ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=67 + echo -n . .+ [[ 67 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uKfUNG9QDh +++ mktemp ++ local LAST_ERR=/tmp/tmp.dYjGaBlyMG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.uKfUNG9QDh ++ cat /tmp/tmp.dYjGaBlyMG ++ rm /tmp/tmp.uKfUNG9QDh /tmp/tmp.dYjGaBlyMG ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=68 + echo -n . .+ [[ 68 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.i4eqbZXrEL +++ mktemp ++ local LAST_ERR=/tmp/tmp.RPOYagBcPh ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.i4eqbZXrEL ++ cat /tmp/tmp.RPOYagBcPh ++ rm /tmp/tmp.i4eqbZXrEL /tmp/tmp.RPOYagBcPh ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=69 + echo -n . .+ [[ 69 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.abuoxHdV6v +++ mktemp ++ local LAST_ERR=/tmp/tmp.xcTy7fdghD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.abuoxHdV6v ++ cat /tmp/tmp.xcTy7fdghD ++ rm /tmp/tmp.abuoxHdV6v /tmp/tmp.xcTy7fdghD ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=70 + echo -n . .+ [[ 70 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZrASptBgqu +++ mktemp ++ local LAST_ERR=/tmp/tmp.Axz2yRQA04 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZrASptBgqu ++ cat /tmp/tmp.Axz2yRQA04 ++ rm /tmp/tmp.ZrASptBgqu /tmp/tmp.Axz2yRQA04 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=71 + echo -n . .+ [[ 71 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Z1FdA5RhO9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.2AFrhzKNX1 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Z1FdA5RhO9 ++ cat /tmp/tmp.2AFrhzKNX1 ++ rm /tmp/tmp.Z1FdA5RhO9 /tmp/tmp.2AFrhzKNX1 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=72 + echo -n . .+ [[ 72 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7V941BMfGP +++ mktemp ++ local LAST_ERR=/tmp/tmp.eCR1r18nm0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.7V941BMfGP ++ cat /tmp/tmp.eCR1r18nm0 ++ rm /tmp/tmp.7V941BMfGP /tmp/tmp.eCR1r18nm0 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=73 + echo -n . .+ [[ 73 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BpvjAnAwI1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.9U9nVjnGRO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.BpvjAnAwI1 ++ cat /tmp/tmp.9U9nVjnGRO ++ rm /tmp/tmp.BpvjAnAwI1 /tmp/tmp.9U9nVjnGRO ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=74 + echo -n . .+ [[ 74 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Z9NvfPvPYY +++ mktemp ++ local LAST_ERR=/tmp/tmp.Jo3p0pNdcz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Z9NvfPvPYY ++ cat /tmp/tmp.Jo3p0pNdcz ++ rm /tmp/tmp.Z9NvfPvPYY /tmp/tmp.Jo3p0pNdcz ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=75 + echo -n . .+ [[ 75 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.A0GQ3gFoCu +++ mktemp ++ local LAST_ERR=/tmp/tmp.nNUy7pI8Cf ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.A0GQ3gFoCu ++ cat /tmp/tmp.nNUy7pI8Cf ++ rm /tmp/tmp.A0GQ3gFoCu /tmp/tmp.nNUy7pI8Cf ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=76 + echo -n . .+ [[ 76 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2Etn81rla2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.KVzsVJxXXo ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2Etn81rla2 ++ cat /tmp/tmp.KVzsVJxXXo ++ rm /tmp/tmp.2Etn81rla2 /tmp/tmp.KVzsVJxXXo ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=77 + echo -n . .+ [[ 77 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xzzHYbQiJI +++ mktemp ++ local LAST_ERR=/tmp/tmp.k2beVMACza ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xzzHYbQiJI ++ cat /tmp/tmp.k2beVMACza ++ rm /tmp/tmp.xzzHYbQiJI /tmp/tmp.k2beVMACza ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=78 + echo -n . .+ [[ 78 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FE27wTXWmA +++ mktemp ++ local LAST_ERR=/tmp/tmp.41KE794FR1 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.FE27wTXWmA ++ cat /tmp/tmp.41KE794FR1 ++ rm /tmp/tmp.FE27wTXWmA /tmp/tmp.41KE794FR1 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=79 + echo -n . .+ [[ 79 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WhlKYwYdJh +++ mktemp ++ local LAST_ERR=/tmp/tmp.NXZqCtDCNo ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.WhlKYwYdJh ++ cat /tmp/tmp.NXZqCtDCNo ++ rm /tmp/tmp.WhlKYwYdJh /tmp/tmp.NXZqCtDCNo ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=80 + echo -n . .+ [[ 80 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ReJDlNmS6Y +++ mktemp ++ local LAST_ERR=/tmp/tmp.7jIfvhXm9I ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ReJDlNmS6Y ++ cat /tmp/tmp.7jIfvhXm9I ++ rm /tmp/tmp.ReJDlNmS6Y /tmp/tmp.7jIfvhXm9I ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=81 + echo -n . .+ [[ 81 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dqQzT9x5Lg +++ mktemp ++ local LAST_ERR=/tmp/tmp.FbMhFKOc8C ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.dqQzT9x5Lg ++ cat /tmp/tmp.FbMhFKOc8C ++ rm /tmp/tmp.dqQzT9x5Lg /tmp/tmp.FbMhFKOc8C ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=82 + echo -n . .+ [[ 82 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.78qj7gZWZd +++ mktemp ++ local LAST_ERR=/tmp/tmp.cW59SbQoFl ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.78qj7gZWZd ++ cat /tmp/tmp.cW59SbQoFl ++ rm /tmp/tmp.78qj7gZWZd /tmp/tmp.cW59SbQoFl ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=83 + echo -n . .+ [[ 83 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vv0DbrtXhn +++ mktemp ++ local LAST_ERR=/tmp/tmp.Bzh9GKDUl6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vv0DbrtXhn ++ cat /tmp/tmp.Bzh9GKDUl6 ++ rm /tmp/tmp.vv0DbrtXhn /tmp/tmp.Bzh9GKDUl6 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=84 + echo -n . .+ [[ 84 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PDW1M0mNxn +++ mktemp ++ local LAST_ERR=/tmp/tmp.xipRmvL4GG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.PDW1M0mNxn ++ cat /tmp/tmp.xipRmvL4GG ++ rm /tmp/tmp.PDW1M0mNxn /tmp/tmp.xipRmvL4GG ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=85 + echo -n . .+ [[ 85 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vtjJRKVRYE +++ mktemp ++ local LAST_ERR=/tmp/tmp.1vVwaJcOUn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vtjJRKVRYE ++ cat /tmp/tmp.1vVwaJcOUn ++ rm /tmp/tmp.vtjJRKVRYE /tmp/tmp.1vVwaJcOUn ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=86 + echo -n . .+ [[ 86 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.eYLN2UnqPu +++ mktemp ++ local LAST_ERR=/tmp/tmp.v7zcAzhavO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.eYLN2UnqPu ++ cat /tmp/tmp.v7zcAzhavO ++ rm /tmp/tmp.eYLN2UnqPu /tmp/tmp.v7zcAzhavO ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=87 + echo -n . .+ [[ 87 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9ayHb0y25H +++ mktemp ++ local LAST_ERR=/tmp/tmp.5n2MKSzELV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.9ayHb0y25H ++ cat /tmp/tmp.5n2MKSzELV ++ rm /tmp/tmp.9ayHb0y25H /tmp/tmp.5n2MKSzELV ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=88 + echo -n . .+ [[ 88 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fwWFM2zdIQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.bLOX9Xzh5A ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fwWFM2zdIQ ++ cat /tmp/tmp.bLOX9Xzh5A ++ rm /tmp/tmp.fwWFM2zdIQ /tmp/tmp.bLOX9Xzh5A ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=89 + echo -n . .+ [[ 89 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.NYjcLtwdl5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.MKFon8fmyK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.NYjcLtwdl5 ++ cat /tmp/tmp.MKFon8fmyK ++ rm /tmp/tmp.NYjcLtwdl5 /tmp/tmp.MKFon8fmyK ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=90 + echo -n . .+ [[ 90 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.C2Z9KywQSo +++ mktemp ++ local LAST_ERR=/tmp/tmp.lzwy9LipuI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.C2Z9KywQSo ++ cat /tmp/tmp.lzwy9LipuI ++ rm /tmp/tmp.C2Z9KywQSo /tmp/tmp.lzwy9LipuI ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=91 + echo -n . .+ [[ 91 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uLx24Jt6UT +++ mktemp ++ local LAST_ERR=/tmp/tmp.qYxvwxpqQJ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.uLx24Jt6UT ++ cat /tmp/tmp.qYxvwxpqQJ ++ rm /tmp/tmp.uLx24Jt6UT /tmp/tmp.qYxvwxpqQJ ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=92 + echo -n . .+ [[ 92 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.AGRMUR7iAO +++ mktemp ++ local LAST_ERR=/tmp/tmp.662BOFuz9C ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.AGRMUR7iAO ++ cat /tmp/tmp.662BOFuz9C ++ rm /tmp/tmp.AGRMUR7iAO /tmp/tmp.662BOFuz9C ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=93 + echo -n . .+ [[ 93 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.aNsWYBG0mf +++ mktemp ++ local LAST_ERR=/tmp/tmp.CP1rwYfgZp ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.aNsWYBG0mf ++ cat /tmp/tmp.CP1rwYfgZp ++ rm /tmp/tmp.aNsWYBG0mf /tmp/tmp.CP1rwYfgZp ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=94 + echo -n . .+ [[ 94 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4gcIZZw1ht +++ mktemp ++ local LAST_ERR=/tmp/tmp.Kht2BtANTu ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.4gcIZZw1ht ++ cat /tmp/tmp.Kht2BtANTu ++ rm /tmp/tmp.4gcIZZw1ht /tmp/tmp.Kht2BtANTu ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=95 + echo -n . .+ [[ 95 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YpiOeqJLMT +++ mktemp ++ local LAST_ERR=/tmp/tmp.TOVs8Ge5b6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.YpiOeqJLMT ++ cat /tmp/tmp.TOVs8Ge5b6 ++ rm /tmp/tmp.YpiOeqJLMT /tmp/tmp.TOVs8Ge5b6 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=96 + echo -n . .+ [[ 96 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.v9NqzgjCwC +++ mktemp ++ local LAST_ERR=/tmp/tmp.4qooVbvElT ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.v9NqzgjCwC ++ cat /tmp/tmp.4qooVbvElT ++ rm /tmp/tmp.v9NqzgjCwC /tmp/tmp.4qooVbvElT ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=97 + echo -n . .+ [[ 97 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OkA5x5mEPI +++ mktemp ++ local LAST_ERR=/tmp/tmp.BIv6tCCoNR ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OkA5x5mEPI ++ cat /tmp/tmp.BIv6tCCoNR ++ rm /tmp/tmp.OkA5x5mEPI /tmp/tmp.BIv6tCCoNR ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=98 + echo -n . .+ [[ 98 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lO7AH4WMCk +++ mktemp ++ local LAST_ERR=/tmp/tmp.aaUik4XajP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lO7AH4WMCk ++ cat /tmp/tmp.aaUik4XajP ++ rm /tmp/tmp.lO7AH4WMCk /tmp/tmp.aaUik4XajP ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=99 + echo -n . .+ [[ 99 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VnT7VgZWYp +++ mktemp ++ local LAST_ERR=/tmp/tmp.wkV7hJRVX8 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.VnT7VgZWYp ++ cat /tmp/tmp.wkV7hJRVX8 ++ rm /tmp/tmp.VnT7VgZWYp /tmp/tmp.wkV7hJRVX8 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=100 + echo -n . .+ [[ 100 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HBDkSMiYdQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.0GY16gIvYd ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HBDkSMiYdQ ++ cat /tmp/tmp.0GY16gIvYd ++ rm /tmp/tmp.HBDkSMiYdQ /tmp/tmp.0GY16gIvYd ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=101 + echo -n . .+ [[ 101 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XFvpM6axAh +++ mktemp ++ local LAST_ERR=/tmp/tmp.JbrsnrbXYR ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XFvpM6axAh ++ cat /tmp/tmp.JbrsnrbXYR ++ rm /tmp/tmp.XFvpM6axAh /tmp/tmp.JbrsnrbXYR ++ return 0 + [[ error =~ ready ]] + sleep 1 + timeout=102 + echo -n . .+ [[ 102 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xmlxhrPRHg +++ mktemp ++ local LAST_ERR=/tmp/tmp.dDFkZV5OH3 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xmlxhrPRHg ++ cat /tmp/tmp.dDFkZV5OH3 ++ rm /tmp/tmp.xmlxhrPRHg /tmp/tmp.dDFkZV5OH3 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=103 + echo -n . .+ [[ 103 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.harQQjHjNk +++ mktemp ++ local LAST_ERR=/tmp/tmp.f6rxMdSvT8 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.harQQjHjNk ++ cat /tmp/tmp.f6rxMdSvT8 ++ rm /tmp/tmp.harQQjHjNk /tmp/tmp.f6rxMdSvT8 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=104 + echo -n . .+ [[ 104 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YA4FfpiBQ8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZvfrBYMGB4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.YA4FfpiBQ8 ++ cat /tmp/tmp.ZvfrBYMGB4 ++ rm /tmp/tmp.YA4FfpiBQ8 /tmp/tmp.ZvfrBYMGB4 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=105 + echo -n . .+ [[ 105 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0oaQtn3poh +++ mktemp ++ local LAST_ERR=/tmp/tmp.JwdZdQ6CY6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.0oaQtn3poh ++ cat /tmp/tmp.JwdZdQ6CY6 ++ rm /tmp/tmp.0oaQtn3poh /tmp/tmp.JwdZdQ6CY6 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=106 + echo -n . .+ [[ 106 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MQRacyyA5w +++ mktemp ++ local LAST_ERR=/tmp/tmp.Mq9A5DvpFN ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.MQRacyyA5w ++ cat /tmp/tmp.Mq9A5DvpFN ++ rm /tmp/tmp.MQRacyyA5w /tmp/tmp.Mq9A5DvpFN ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=107 + echo -n . .+ [[ 107 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BT42oFmdgZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.CmYUG3K0Vt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.BT42oFmdgZ ++ cat /tmp/tmp.CmYUG3K0Vt ++ rm /tmp/tmp.BT42oFmdgZ /tmp/tmp.CmYUG3K0Vt ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=108 + echo -n . .+ [[ 108 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cUD82E4Job +++ mktemp ++ local LAST_ERR=/tmp/tmp.PLAhlMoJA6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.cUD82E4Job ++ cat /tmp/tmp.PLAhlMoJA6 ++ rm /tmp/tmp.cUD82E4Job /tmp/tmp.PLAhlMoJA6 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=109 + echo -n . .+ [[ 109 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.snLSKmspgT +++ mktemp ++ local LAST_ERR=/tmp/tmp.3IMSfn59IJ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.snLSKmspgT ++ cat /tmp/tmp.3IMSfn59IJ ++ rm /tmp/tmp.snLSKmspgT /tmp/tmp.3IMSfn59IJ ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=110 + echo -n . .+ [[ 110 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CEN7wMLbSZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.rsrJVo4GLA ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.CEN7wMLbSZ ++ cat /tmp/tmp.rsrJVo4GLA ++ rm /tmp/tmp.CEN7wMLbSZ /tmp/tmp.rsrJVo4GLA ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=111 + echo -n . .+ [[ 111 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fBbbnVCRAP +++ mktemp ++ local LAST_ERR=/tmp/tmp.InDAAp6X3O ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fBbbnVCRAP ++ cat /tmp/tmp.InDAAp6X3O ++ rm /tmp/tmp.fBbbnVCRAP /tmp/tmp.InDAAp6X3O ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=112 + echo -n . .+ [[ 112 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5vkgedAQfA +++ mktemp ++ local LAST_ERR=/tmp/tmp.5pmdVx65eI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.5vkgedAQfA ++ cat /tmp/tmp.5pmdVx65eI ++ rm /tmp/tmp.5vkgedAQfA /tmp/tmp.5pmdVx65eI ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=113 + echo -n . .+ [[ 113 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.y1zKjrfz7i +++ mktemp ++ local LAST_ERR=/tmp/tmp.nxgZMplY7m ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.y1zKjrfz7i ++ cat /tmp/tmp.nxgZMplY7m ++ rm /tmp/tmp.y1zKjrfz7i /tmp/tmp.nxgZMplY7m ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=114 + echo -n . .+ [[ 114 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pIt17Qr9SJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.7xIPHQHHBz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.pIt17Qr9SJ ++ cat /tmp/tmp.7xIPHQHHBz ++ rm /tmp/tmp.pIt17Qr9SJ /tmp/tmp.7xIPHQHHBz ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=115 + echo -n . .+ [[ 115 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.K4g0DQpAaJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.4JsXa9KxX3 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.K4g0DQpAaJ ++ cat /tmp/tmp.4JsXa9KxX3 ++ rm /tmp/tmp.K4g0DQpAaJ /tmp/tmp.4JsXa9KxX3 ++ return 0 + [[ ready =~ ready ]] + echo + log 'psmdb/some-name is ready: OK' + set +o xtrace [2026-03-10T21:57:58+0000] psmdb/some-name is ready: OK + desc 'Adding new user' + set +o xtrace ----------------------------------------------------------------------------------- Adding new user ----------------------------------------------------------------------------------- + run_mongo 'db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})' userAdmin:userAdmin123456@some-name-rs0.demand-backup-if-unhealthy-26494 + local 'command=db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})' + local uri=userAdmin:userAdmin123456@some-name-rs0.demand-backup-if-unhealthy-26494 + local driver=mongodb+srv + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ userAdmin:userAdmin123456@some-name-rs0.demand-backup-if-unhealthy-26494 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.s3lk8H14KY +++ mktemp ++ local LAST_ERR=/tmp/tmp.IAgmFmgjBh ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.s3lk8H14KY ++ cat /tmp/tmp.IAgmFmgjBh ++ rm /tmp/tmp.s3lk8H14KY /tmp/tmp.IAgmFmgjBh ++ return 0 + local client_container=psmdb-client-bb8b97679-j25ts + kubectl_bin exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})\n'\'' | mongo mongodb+srv://userAdmin:userAdmin123456@some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.P7OZr75eUN ++ mktemp + local LAST_ERR=/tmp/tmp.vFcrbRZWfZ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"}]})\n'\'' | mongo mongodb+srv://userAdmin:userAdmin123456@some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.P7OZr75eUN Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-rs0-2.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local:27017,some-name-rs0-1.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local:27017,some-name-rs0-0.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb&replicaSet=rs0&ssl=false Implicit session: session { "id" : UUID("2fb624e2-6a61-4838-90bb-495bbd7927f3") } Percona Server for MongoDB server version: v8.0.19-7 WARNING: shell and server versions do not match Successfully added user: { "user" : "myApp", "roles" : [ { "db" : "myApp", "role" : "readWrite" } ] } bye + cat /tmp/tmp.vFcrbRZWfZ + rm /tmp/tmp.P7OZr75eUN /tmp/tmp.vFcrbRZWfZ + return 0 + echo -n 'Verifying user creation...' Verifying user creation...+ until_with_timeout 10 check_user + local timeout=10 + shift + local elapsed=0 + check_user + run_mongo 'db.getUser("myApp")' userAdmin:userAdmin123456@some-name-rs0.demand-backup-if-unhealthy-26494 + local 'command=db.getUser("myApp")' + local uri=userAdmin:userAdmin123456@some-name-rs0.demand-backup-if-unhealthy-26494 + local driver=mongodb+srv + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ userAdmin:userAdmin123456@some-name-rs0.demand-backup-if-unhealthy-26494 == *cfg* ]] + grep -q '"user" : "myApp"' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1CpCy2pLIZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.OKEBOwIkqc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.1CpCy2pLIZ ++ cat /tmp/tmp.OKEBOwIkqc ++ rm /tmp/tmp.1CpCy2pLIZ /tmp/tmp.OKEBOwIkqc ++ return 0 + local client_container=psmdb-client-bb8b97679-j25ts + kubectl_bin exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''db.getUser("myApp")\n'\'' | mongo mongodb+srv://userAdmin:userAdmin123456@some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.IUbrINevLs ++ mktemp + local LAST_ERR=/tmp/tmp.uObacNNaLY + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''db.getUser("myApp")\n'\'' | mongo mongodb+srv://userAdmin:userAdmin123456@some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.IUbrINevLs + cat /tmp/tmp.uObacNNaLY + rm /tmp/tmp.IUbrINevLs /tmp/tmp.uObacNNaLY + return 0 + return 0 + desc 'Testing logical backup with an unhealthy container' + set +o xtrace ----------------------------------------------------------------------------------- Testing logical backup with an unhealthy container ----------------------------------------------------------------------------------- + type=logical + write_data 'This is some data for backup if unhealthy' + local 'data=This is some data for backup if unhealthy' + local find_prefix= + run_mongo 'use myApp\n db.test.insert({ x: "This is some data for backup if unhealthy" })' myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494 + local 'command=use myApp\n db.test.insert({ x: "This is some data for backup if unhealthy" })' + local uri=myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494 + local driver=mongodb+srv + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KIaV8pdJeC +++ mktemp ++ local LAST_ERR=/tmp/tmp.clB1nm6UJw ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.KIaV8pdJeC ++ cat /tmp/tmp.clB1nm6UJw ++ rm /tmp/tmp.KIaV8pdJeC /tmp/tmp.clB1nm6UJw ++ return 0 + local client_container=psmdb-client-bb8b97679-j25ts + kubectl_bin exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''use myApp\n db.test.insert({ x: "This is some data for backup if unhealthy" })\n'\'' | mongo mongodb+srv://myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.PtL9QN0WL8 ++ mktemp + local LAST_ERR=/tmp/tmp.tuoopYvEN8 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''use myApp\n db.test.insert({ x: "This is some data for backup if unhealthy" })\n'\'' | mongo mongodb+srv://myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.PtL9QN0WL8 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-rs0-2.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local:27017,some-name-rs0-1.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local:27017,some-name-rs0-0.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb&replicaSet=rs0&ssl=false Implicit session: session { "id" : UUID("b04829a9-7973-4789-8dda-513159d0fa9a") } Percona Server for MongoDB server version: v8.0.19-7 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.tuoopYvEN8 + rm /tmp/tmp.PtL9QN0WL8 /tmp/tmp.tuoopYvEN8 + return 0 + compare_mongo_cmd find myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494 '' .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494 + local postfix= + local suffix=.svc.cluster.local + local database=myApp + local collection=test + local sort= + local tls=false + local replicaset= + local 'full_command=db.test.find()' + [[ -n '' ]] + log 'running db.test.find() in myApp' + set +o xtrace [2026-03-10T21:58:08+0000] running db.test.find() in myApp + [[ false == \t\r\u\e ]] + mongo_command=run_mongo + run_mongo 'use myApp\n db.test.find()' myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494 mongodb .svc.cluster.local '' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + grep -E -v 'I NETWORK|W NETWORK|F NETWORK|"c":"NETWORK"|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + local replica_set=rs0 + [[ myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494 == *cfg* ]] + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.D5RGoU860E +++ mktemp ++ local LAST_ERR=/tmp/tmp.zQxpCDpKgO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.D5RGoU860E ++ cat /tmp/tmp.zQxpCDpKgO ++ rm /tmp/tmp.D5RGoU860E /tmp/tmp.zQxpCDpKgO ++ return 0 + local client_container=psmdb-client-bb8b97679-j25ts + kubectl_bin exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.X1KUSmGrQE ++ mktemp + local LAST_ERR=/tmp/tmp.aMWVOvn3hs + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.X1KUSmGrQE + cat /tmp/tmp.aMWVOvn3hs + rm /tmp/tmp.X1KUSmGrQE /tmp/tmp.aMWVOvn3hs + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/compare/find.json /tmp/tmp.gFB8zmN56Q/find + wait_sts_to_become_not_ready + local sts_name=some-name-rs0 + local timeout=60 + local pod_name=some-name-rs0-1 + local interval=2 + local elapsed=0 + echo 'Updating cluster with invalid image...' Updating cluster with invalid image... + update_with_invalid_db_image + local cluster_name=some-name + yq /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/conf/some-name.yml + yq '.spec.image="invalid-image:invalid-tag"' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.X8Z2rqcefx ++ mktemp + local LAST_ERR=/tmp/tmp.UkKfTEZNhR + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.X8Z2rqcefx perconaservermongodb.psmdb.percona.com/some-name configured + cat /tmp/tmp.UkKfTEZNhR + rm /tmp/tmp.X8Z2rqcefx /tmp/tmp.UkKfTEZNhR + return 0 + echo -n 'Wait for statefulset some-name-rs0 to become not ready...' Wait for statefulset some-name-rs0 to become not ready...+ is_sts_ready some-name-rs0 + local sts_name=some-name-rs0 + local replicas ready_replicas + kubectl_bin get sts some-name-rs0 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.O5ZHL6YXWl +++ mktemp ++ local LAST_ERR=/tmp/tmp.5q2ZIGimdj ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.O5ZHL6YXWl ++ cat /tmp/tmp.5q2ZIGimdj ++ rm /tmp/tmp.O5ZHL6YXWl /tmp/tmp.5q2ZIGimdj ++ return 0 + replicas=3 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FBBc2IexSv +++ mktemp ++ local LAST_ERR=/tmp/tmp.xS4qUj8Srb ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.FBBc2IexSv ++ cat /tmp/tmp.xS4qUj8Srb ++ rm /tmp/tmp.FBBc2IexSv /tmp/tmp.xS4qUj8Srb ++ return 0 + ready_replicas=3 + [[ 3 -eq 3 ]] + (( elapsed >= timeout )) + sleep 2 + (( elapsed += interval )) + echo -n . .+ is_sts_ready some-name-rs0 + local sts_name=some-name-rs0 + local replicas ready_replicas + kubectl_bin get sts some-name-rs0 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oJ75NCU7Qo +++ mktemp ++ local LAST_ERR=/tmp/tmp.OyTTZfH8wo ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.oJ75NCU7Qo ++ cat /tmp/tmp.OyTTZfH8wo ++ rm /tmp/tmp.oJ75NCU7Qo /tmp/tmp.OyTTZfH8wo ++ return 0 + replicas=3 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wkZEBcbTbS +++ mktemp ++ local LAST_ERR=/tmp/tmp.SOB9KQNMdG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.wkZEBcbTbS ++ cat /tmp/tmp.SOB9KQNMdG ++ rm /tmp/tmp.wkZEBcbTbS /tmp/tmp.SOB9KQNMdG ++ return 0 + ready_replicas=3 + [[ 3 -eq 3 ]] + (( elapsed >= timeout )) + sleep 2 + (( elapsed += interval )) + echo -n . .+ is_sts_ready some-name-rs0 + local sts_name=some-name-rs0 + local replicas ready_replicas + kubectl_bin get sts some-name-rs0 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VKp40Sn3cA +++ mktemp ++ local LAST_ERR=/tmp/tmp.V4VEyOBo5H ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.VKp40Sn3cA ++ cat /tmp/tmp.V4VEyOBo5H ++ rm /tmp/tmp.VKp40Sn3cA /tmp/tmp.V4VEyOBo5H ++ return 0 + replicas=3 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cRo2AbPRYg +++ mktemp ++ local LAST_ERR=/tmp/tmp.nynkivLAds ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.cRo2AbPRYg ++ cat /tmp/tmp.nynkivLAds ++ rm /tmp/tmp.cRo2AbPRYg /tmp/tmp.nynkivLAds ++ return 0 + ready_replicas=3 + [[ 3 -eq 3 ]] + (( elapsed >= timeout )) + sleep 2 + (( elapsed += interval )) + echo -n . .+ is_sts_ready some-name-rs0 + local sts_name=some-name-rs0 + local replicas ready_replicas + kubectl_bin get sts some-name-rs0 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.f1Wjc45yio +++ mktemp ++ local LAST_ERR=/tmp/tmp.eBE8Qvcw3J ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.f1Wjc45yio ++ cat /tmp/tmp.eBE8Qvcw3J ++ rm /tmp/tmp.f1Wjc45yio /tmp/tmp.eBE8Qvcw3J ++ return 0 + replicas=3 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BzpxCn2lfC +++ mktemp ++ local LAST_ERR=/tmp/tmp.5Y4wuB0Ddi ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.BzpxCn2lfC ++ cat /tmp/tmp.5Y4wuB0Ddi ++ rm /tmp/tmp.BzpxCn2lfC /tmp/tmp.5Y4wuB0Ddi ++ return 0 + ready_replicas=3 + [[ 3 -eq 3 ]] + (( elapsed >= timeout )) + sleep 2 + (( elapsed += interval )) + echo -n . .+ is_sts_ready some-name-rs0 + local sts_name=some-name-rs0 + local replicas ready_replicas + kubectl_bin get sts some-name-rs0 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jPebG1uzsC +++ mktemp ++ local LAST_ERR=/tmp/tmp.yW5BR1t5bn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.jPebG1uzsC ++ cat /tmp/tmp.yW5BR1t5bn ++ rm /tmp/tmp.jPebG1uzsC /tmp/tmp.yW5BR1t5bn ++ return 0 + replicas=3 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OsmcYru6TA +++ mktemp ++ local LAST_ERR=/tmp/tmp.Wo5UWiZqSp ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OsmcYru6TA ++ cat /tmp/tmp.Wo5UWiZqSp ++ rm /tmp/tmp.OsmcYru6TA /tmp/tmp.Wo5UWiZqSp ++ return 0 + ready_replicas=2 + [[ 3 -eq 2 ]] + wait_for_cluster_state some-name 'initializing|error' + local cluster_name=some-name + local 'target_state=initializing|error' + echo -n 'Waiting for psmdb/some-name to reach initializing|error state' Waiting for psmdb/some-name to reach initializing|error state+ local timeout=0 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5OdyRegmpE +++ mktemp ++ local LAST_ERR=/tmp/tmp.OVeNU29Rfq ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.5OdyRegmpE ++ cat /tmp/tmp.OVeNU29Rfq ++ rm /tmp/tmp.5OdyRegmpE /tmp/tmp.OVeNU29Rfq ++ return 0 + [[ initializing =~ initializing|error ]] + echo + log 'psmdb/some-name is initializing|error: OK' + set +o xtrace [2026-03-10T21:58:41+0000] psmdb/some-name is initializing|error: OK + backup_name_minio=backup-minio-logical + run_backup minio backup-minio-logical logical + local storage=minio + local backup_name=backup-minio-logical + local type=logical + log 'running backup backup-minio-logical' + set +o xtrace [2026-03-10T21:58:41+0000] running backup backup-minio-logical + yq eval '.metadata.name = "backup-minio-logical" | .spec.storageName = "minio" | .spec.type = "logical"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/conf/backup-minio.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.Uowtm2E0Ei ++ mktemp + local LAST_ERR=/tmp/tmp.kuvRUkvtbP + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Uowtm2E0Ei perconaservermongodbbackup.psmdb.percona.com/backup-minio-logical created + cat /tmp/tmp.kuvRUkvtbP + rm /tmp/tmp.Uowtm2E0Ei /tmp/tmp.kuvRUkvtbP + return 0 + verify_sts_not_ready + local sts_name=some-name-rs0 + is_sts_ready some-name-rs0 + local sts_name=some-name-rs0 + local replicas ready_replicas + kubectl_bin get sts some-name-rs0 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gNHtNUV4ad +++ mktemp ++ local LAST_ERR=/tmp/tmp.91OWt6SXYb ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.gNHtNUV4ad ++ cat /tmp/tmp.91OWt6SXYb ++ rm /tmp/tmp.gNHtNUV4ad /tmp/tmp.91OWt6SXYb ++ return 0 + replicas=3 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7Ah2tlE7e3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.2txu25ut49 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.7Ah2tlE7e3 ++ cat /tmp/tmp.2txu25ut49 ++ rm /tmp/tmp.7Ah2tlE7e3 /tmp/tmp.2txu25ut49 ++ return 0 + ready_replicas=2 + [[ 3 -eq 2 ]] + wait_for_cluster_state some-name 'initializing|error' + local cluster_name=some-name + local 'target_state=initializing|error' + echo -n 'Waiting for psmdb/some-name to reach initializing|error state' Waiting for psmdb/some-name to reach initializing|error state+ local timeout=0 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.iZaPgqamfx +++ mktemp ++ local LAST_ERR=/tmp/tmp.LCp6Lu8VCu ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.iZaPgqamfx ++ cat /tmp/tmp.LCp6Lu8VCu ++ rm /tmp/tmp.iZaPgqamfx /tmp/tmp.LCp6Lu8VCu ++ return 0 + [[ initializing =~ initializing|error ]] + echo + log 'psmdb/some-name is initializing|error: OK' + set +o xtrace [2026-03-10T21:58:48+0000] psmdb/some-name is initializing|error: OK + desc 'Verifying backup-minio-logical and update cluster back to ready state' + set +o xtrace ----------------------------------------------------------------------------------- Verifying backup-minio-logical and update cluster back to ready state ----------------------------------------------------------------------------------- + wait_backup backup-minio-logical ready + local backup_name=backup-minio-logical + local target_state=ready + set +o xtrace waiting for backup-minio-logical to reach ready state...............OK + verify_sts_not_ready + local sts_name=some-name-rs0 + is_sts_ready some-name-rs0 + local sts_name=some-name-rs0 + local replicas ready_replicas + kubectl_bin get sts some-name-rs0 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DGf5h2kRnp +++ mktemp ++ local LAST_ERR=/tmp/tmp.GWUzLOuiP8 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.spec.replicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.DGf5h2kRnp ++ cat /tmp/tmp.GWUzLOuiP8 ++ rm /tmp/tmp.DGf5h2kRnp /tmp/tmp.GWUzLOuiP8 ++ return 0 + replicas=3 ++ kubectl_bin get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7AXoYYrhIU +++ mktemp ++ local LAST_ERR=/tmp/tmp.3DbGahP8Fq ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get sts some-name-rs0 -o 'jsonpath={.status.readyReplicas}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.7AXoYYrhIU ++ cat /tmp/tmp.3DbGahP8Fq ++ rm /tmp/tmp.7AXoYYrhIU /tmp/tmp.3DbGahP8Fq ++ return 0 + ready_replicas=2 + [[ 3 -eq 2 ]] + wait_for_cluster_state some-name 'initializing|error' + local cluster_name=some-name + local 'target_state=initializing|error' + echo -n 'Waiting for psmdb/some-name to reach initializing|error state' Waiting for psmdb/some-name to reach initializing|error state+ local timeout=0 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.X3XNPKpBiL +++ mktemp ++ local LAST_ERR=/tmp/tmp.1VpNgO29uI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.X3XNPKpBiL ++ cat /tmp/tmp.1VpNgO29uI ++ rm /tmp/tmp.X3XNPKpBiL /tmp/tmp.1VpNgO29uI ++ return 0 + [[ initializing =~ initializing|error ]] + echo + log 'psmdb/some-name is initializing|error: OK' + set +o xtrace [2026-03-10T21:59:20+0000] psmdb/some-name is initializing|error: OK + rollback_invalid_image + local cluster_name=some-name + local timeout= + apply_cluster /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/conf/some-name.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/conf/some-name.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/conf/some-name.yml + yq eval '(.spec | select(.image == null)).image = "docker.io/perconalab/percona-server-mongodb-operator:main-mongod8.0"' + yq eval '(.spec | select(has("pmm"))).pmm.image = "docker.io/percona/pmm-client:2.44.1-1"' ++ mktemp + yq eval '(.spec | select(has("initImage"))).initImage = "docker.io/perconalab/percona-server-mongodb-operator:PR-2219-d7e802db"' + yq eval '(.spec | select(has("backup"))).backup.image = "docker.io/perconalab/percona-server-mongodb-operator:main-backup"' + /usr/sbin/sed -e s/NAME_SPACE/demand-backup-if-unhealthy-26494/g + yq eval '.spec.upgradeOptions.apply="Never"' + local LAST_OUT=/tmp/tmp.4ggFnrnfTm ++ mktemp + local LAST_ERR=/tmp/tmp.jcXlUvpcTy + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.4ggFnrnfTm perconaservermongodb.psmdb.percona.com/some-name configured + cat /tmp/tmp.jcXlUvpcTy + rm /tmp/tmp.4ggFnrnfTm /tmp/tmp.jcXlUvpcTy + return 0 + echo -n 'Waiting new statefulset version...' Waiting new statefulset version...+ kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.iDxVIcCRqX ++ mktemp + local LAST_ERR=/tmp/tmp.4TAIY2hDOB + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.iDxVIcCRqX + cat /tmp/tmp.4TAIY2hDOB + rm /tmp/tmp.iDxVIcCRqX /tmp/tmp.4TAIY2hDOB + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.nH0isxNogz ++ mktemp + local LAST_ERR=/tmp/tmp.A7HMQs8zDv + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.nH0isxNogz + cat /tmp/tmp.A7HMQs8zDv + rm /tmp/tmp.nH0isxNogz /tmp/tmp.A7HMQs8zDv + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.P5pHL9lETR ++ mktemp + local LAST_ERR=/tmp/tmp.evO5DGQDKS + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.P5pHL9lETR + cat /tmp/tmp.evO5DGQDKS + rm /tmp/tmp.P5pHL9lETR /tmp/tmp.evO5DGQDKS + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.Oqcpq0ku6P ++ mktemp + local LAST_ERR=/tmp/tmp.zKFcxhf1js + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Oqcpq0ku6P + cat /tmp/tmp.zKFcxhf1js + rm /tmp/tmp.Oqcpq0ku6P /tmp/tmp.zKFcxhf1js + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.ZgQD2zRdmg ++ mktemp + local LAST_ERR=/tmp/tmp.gcMovoucag + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ZgQD2zRdmg + cat /tmp/tmp.gcMovoucag + rm /tmp/tmp.ZgQD2zRdmg /tmp/tmp.gcMovoucag + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.JdCB00Cvcc ++ mktemp + local LAST_ERR=/tmp/tmp.OFfJ48KeX6 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.JdCB00Cvcc + cat /tmp/tmp.OFfJ48KeX6 + rm /tmp/tmp.JdCB00Cvcc /tmp/tmp.OFfJ48KeX6 + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.b1HYpdEsy0 ++ mktemp + local LAST_ERR=/tmp/tmp.eRG3Q8we24 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.b1HYpdEsy0 + cat /tmp/tmp.eRG3Q8we24 + rm /tmp/tmp.b1HYpdEsy0 /tmp/tmp.eRG3Q8we24 + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.aTnGNGY7zt ++ mktemp + local LAST_ERR=/tmp/tmp.Kodu8TRhPa + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.aTnGNGY7zt + cat /tmp/tmp.Kodu8TRhPa + rm /tmp/tmp.aTnGNGY7zt /tmp/tmp.Kodu8TRhPa + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.knZ3L62iDS ++ mktemp + local LAST_ERR=/tmp/tmp.cKCGAp3lg9 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.knZ3L62iDS + cat /tmp/tmp.cKCGAp3lg9 + rm /tmp/tmp.knZ3L62iDS /tmp/tmp.cKCGAp3lg9 + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.GxMmmJEzbI ++ mktemp + local LAST_ERR=/tmp/tmp.8J32s4SCNC + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.GxMmmJEzbI + cat /tmp/tmp.8J32s4SCNC + rm /tmp/tmp.GxMmmJEzbI /tmp/tmp.8J32s4SCNC + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' ++ mktemp + grep -q invalid-image:invalid-tag + local LAST_OUT=/tmp/tmp.UX4IjGHXih ++ mktemp + local LAST_ERR=/tmp/tmp.9XxNkCZbsA + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.UX4IjGHXih + cat /tmp/tmp.9XxNkCZbsA + rm /tmp/tmp.UX4IjGHXih /tmp/tmp.9XxNkCZbsA + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.ueqcSPiegX ++ mktemp + local LAST_ERR=/tmp/tmp.0anzVASznF + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ueqcSPiegX + cat /tmp/tmp.0anzVASznF + rm /tmp/tmp.ueqcSPiegX /tmp/tmp.0anzVASznF + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' ++ mktemp + grep -q invalid-image:invalid-tag + local LAST_OUT=/tmp/tmp.g4qlZVIK98 ++ mktemp + local LAST_ERR=/tmp/tmp.YnX6xmVgZ8 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.g4qlZVIK98 + cat /tmp/tmp.YnX6xmVgZ8 + rm /tmp/tmp.g4qlZVIK98 /tmp/tmp.YnX6xmVgZ8 + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.ouTMJ9Lb7e ++ mktemp + local LAST_ERR=/tmp/tmp.dz3znIgtc5 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ouTMJ9Lb7e + cat /tmp/tmp.dz3znIgtc5 + rm /tmp/tmp.ouTMJ9Lb7e /tmp/tmp.dz3znIgtc5 + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.L5g94JOMZv ++ mktemp + local LAST_ERR=/tmp/tmp.V25QtLjJVd + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.L5g94JOMZv + cat /tmp/tmp.V25QtLjJVd + rm /tmp/tmp.L5g94JOMZv /tmp/tmp.V25QtLjJVd + return 0 + echo -n . .+ sleep 1 + kubectl_bin get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + grep -q invalid-image:invalid-tag ++ mktemp + local LAST_OUT=/tmp/tmp.8XXBAweY99 ++ mktemp + local LAST_ERR=/tmp/tmp.WxB4kBJ5gK + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get statefulset some-name-rs0 -o 'jsonpath={range .spec.template.spec.containers[*]}{.image}{"\n"}{end}' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.8XXBAweY99 + cat /tmp/tmp.WxB4kBJ5gK + rm /tmp/tmp.8XXBAweY99 /tmp/tmp.WxB4kBJ5gK + return 0 + echo + echo 'Deleting crashing pod some-name-rs0-2' Deleting crashing pod some-name-rs0-2 + kubectl_bin delete pod some-name-rs0-2 --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.PD09Z4Piya ++ mktemp + local LAST_ERR=/tmp/tmp.bQcep6oo8F + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete pod some-name-rs0-2 --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.PD09Z4Piya pod "some-name-rs0-2" deleted from demand-backup-if-unhealthy-26494 namespace + cat /tmp/tmp.bQcep6oo8F + rm /tmp/tmp.PD09Z4Piya /tmp/tmp.bQcep6oo8F + return 0 + wait_for_cluster_state some-name ready + local cluster_name=some-name + local target_state=ready + echo -n 'Waiting for psmdb/some-name to reach ready state' Waiting for psmdb/some-name to reach ready state+ local timeout=0 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0hnNa1ASFa +++ mktemp ++ local LAST_ERR=/tmp/tmp.uOH6EJC2hA ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.0hnNa1ASFa ++ cat /tmp/tmp.uOH6EJC2hA ++ rm /tmp/tmp.0hnNa1ASFa /tmp/tmp.uOH6EJC2hA ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=1 + echo -n . .+ [[ 1 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Lz7V1OqjZF +++ mktemp ++ local LAST_ERR=/tmp/tmp.s2pJ5PENFJ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Lz7V1OqjZF ++ cat /tmp/tmp.s2pJ5PENFJ ++ rm /tmp/tmp.Lz7V1OqjZF /tmp/tmp.s2pJ5PENFJ ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=2 + echo -n . .+ [[ 2 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Xrsr9z5uK1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.k3nGwkjmJs ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Xrsr9z5uK1 ++ cat /tmp/tmp.k3nGwkjmJs ++ rm /tmp/tmp.Xrsr9z5uK1 /tmp/tmp.k3nGwkjmJs ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=3 + echo -n . .+ [[ 3 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DG292YopIq +++ mktemp ++ local LAST_ERR=/tmp/tmp.7N7EULw20G ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.DG292YopIq ++ cat /tmp/tmp.7N7EULw20G ++ rm /tmp/tmp.DG292YopIq /tmp/tmp.7N7EULw20G ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=4 + echo -n . .+ [[ 4 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mqlSQWoLx5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Zvx5FfF6YM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.mqlSQWoLx5 ++ cat /tmp/tmp.Zvx5FfF6YM ++ rm /tmp/tmp.mqlSQWoLx5 /tmp/tmp.Zvx5FfF6YM ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=5 + echo -n . .+ [[ 5 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.aMUiAalbNE +++ mktemp ++ local LAST_ERR=/tmp/tmp.CXHe7U3x28 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.aMUiAalbNE ++ cat /tmp/tmp.CXHe7U3x28 ++ rm /tmp/tmp.aMUiAalbNE /tmp/tmp.CXHe7U3x28 ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=6 + echo -n . .+ [[ 6 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4AGbPig05Y +++ mktemp ++ local LAST_ERR=/tmp/tmp.WvsqTVn71o ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.4AGbPig05Y ++ cat /tmp/tmp.WvsqTVn71o ++ rm /tmp/tmp.4AGbPig05Y /tmp/tmp.WvsqTVn71o ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=7 + echo -n . .+ [[ 7 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.h0XUM5xSHZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.Jx0Js9LX7O ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.h0XUM5xSHZ ++ cat /tmp/tmp.Jx0Js9LX7O ++ rm /tmp/tmp.h0XUM5xSHZ /tmp/tmp.Jx0Js9LX7O ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=8 + echo -n . .+ [[ 8 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vrzxL6vd5g +++ mktemp ++ local LAST_ERR=/tmp/tmp.s9r3Q1PiXB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vrzxL6vd5g ++ cat /tmp/tmp.s9r3Q1PiXB ++ rm /tmp/tmp.vrzxL6vd5g /tmp/tmp.s9r3Q1PiXB ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=9 + echo -n . .+ [[ 9 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ufXPJoE6mK +++ mktemp ++ local LAST_ERR=/tmp/tmp.69xlDgrzVG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ufXPJoE6mK ++ cat /tmp/tmp.69xlDgrzVG ++ rm /tmp/tmp.ufXPJoE6mK /tmp/tmp.69xlDgrzVG ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=10 + echo -n . .+ [[ 10 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SAuptHYUsN +++ mktemp ++ local LAST_ERR=/tmp/tmp.TRZ5g9Yblx ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.SAuptHYUsN ++ cat /tmp/tmp.TRZ5g9Yblx ++ rm /tmp/tmp.SAuptHYUsN /tmp/tmp.TRZ5g9Yblx ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=11 + echo -n . .+ [[ 11 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DuhqypYTV6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.oWUrmZP4wB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.DuhqypYTV6 ++ cat /tmp/tmp.oWUrmZP4wB ++ rm /tmp/tmp.DuhqypYTV6 /tmp/tmp.oWUrmZP4wB ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=12 + echo -n . .+ [[ 12 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hhZ7Go0yY9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ykkVsSNA3z ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hhZ7Go0yY9 ++ cat /tmp/tmp.ykkVsSNA3z ++ rm /tmp/tmp.hhZ7Go0yY9 /tmp/tmp.ykkVsSNA3z ++ return 0 + [[ initializing =~ ready ]] + sleep 1 + timeout=13 + echo -n . .+ [[ 13 -gt 1500 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CZy3M2JqZw +++ mktemp ++ local LAST_ERR=/tmp/tmp.20ED5Q5EsV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.CZy3M2JqZw ++ cat /tmp/tmp.20ED5Q5EsV ++ rm /tmp/tmp.CZy3M2JqZw /tmp/tmp.20ED5Q5EsV ++ return 0 + [[ ready =~ ready ]] + echo + log 'psmdb/some-name is ready: OK' + set +o xtrace [2026-03-10T22:00:24+0000] psmdb/some-name is ready: OK + desc 'Delete data and run restore of backup-minio-logical' + set +o xtrace ----------------------------------------------------------------------------------- Delete data and run restore of backup-minio-logical ----------------------------------------------------------------------------------- + delete_data 'This is some data for backup if unhealthy' + local 'data=This is some data for backup if unhealthy' + run_mongo 'use myApp\n db.test.deleteOne({ x: "This is some data for backup if unhealthy" })' myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494 + local 'command=use myApp\n db.test.deleteOne({ x: "This is some data for backup if unhealthy" })' + local uri=myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494 + local driver=mongodb+srv + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yLDUf0Fcfl +++ mktemp ++ local LAST_ERR=/tmp/tmp.CJmbuWEJEz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yLDUf0Fcfl ++ cat /tmp/tmp.CJmbuWEJEz ++ rm /tmp/tmp.yLDUf0Fcfl /tmp/tmp.CJmbuWEJEz ++ return 0 + local client_container=psmdb-client-bb8b97679-j25ts + kubectl_bin exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''use myApp\n db.test.deleteOne({ x: "This is some data for backup if unhealthy" })\n'\'' | mongo mongodb+srv://myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.w012ZLmGcn ++ mktemp + local LAST_ERR=/tmp/tmp.8nV3GJQy7Q + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''use myApp\n db.test.deleteOne({ x: "This is some data for backup if unhealthy" })\n'\'' | mongo mongodb+srv://myApp:myPass@some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.w012ZLmGcn Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-rs0-2.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local:27017,some-name-rs0-1.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local:27017,some-name-rs0-0.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb&replicaSet=rs0&ssl=false Implicit session: session { "id" : UUID("57593d3f-91bb-4e4e-a159-8fa1292661bb") } Percona Server for MongoDB server version: v8.0.19-7 WARNING: shell and server versions do not match switched to db myApp { "acknowledged" : true, "deletedCount" : 1 } bye + cat /tmp/tmp.8nV3GJQy7Q + rm /tmp/tmp.w012ZLmGcn /tmp/tmp.8nV3GJQy7Q + return 0 + run_restore backup-minio-logical + local backup_name=backup-minio-logical + local restore_file=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/conf/restore.yml + log 'running restore restore-backup-minio-logical' + set +o xtrace [2026-03-10T22:00:27+0000] running restore restore-backup-minio-logical + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/conf/restore.yml + /usr/sbin/sed -e 's/name:/name: restore-backup-minio-logical/' + /usr/sbin/sed -e 's/backupName:/backupName: backup-minio-logical/' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.heWtvJEUGX ++ mktemp + local LAST_ERR=/tmp/tmp.xld8A06WJa + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.heWtvJEUGX perconaservermongodbrestore.psmdb.percona.com/restore-backup-minio-logical created + cat /tmp/tmp.xld8A06WJa + rm /tmp/tmp.heWtvJEUGX /tmp/tmp.xld8A06WJa + return 0 + wait_restore backup-minio-logical some-name + local backup_name=backup-minio-logical + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=1780 + local ok_if_ready=0 + set +o xtrace Waiting for the psmdb-restore/restore-backup-minio-logical object to be created.OK Waiting psmdb-restore/restore-backup-minio-logical to reach state "ready" .OK after 0 minutes + [[ 1 -eq 1 ]] + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HmTQs8OFhf +++ mktemp ++ local LAST_ERR=/tmp/tmp.J50DksNavp ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HmTQs8OFhf ++ cat /tmp/tmp.J50DksNavp ++ rm /tmp/tmp.HmTQs8OFhf /tmp/tmp.J50DksNavp ++ return 0 + [[ ready == \r\e\a\d\y ]] + echo .OK .OK + wait_for_cluster_state some-name ready + local cluster_name=some-name + local target_state=ready + echo -n 'Waiting for psmdb/some-name to reach ready state' Waiting for psmdb/some-name to reach ready state+ local timeout=0 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.la8C7O1Aqf +++ mktemp ++ local LAST_ERR=/tmp/tmp.h8nfuHglC9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.la8C7O1Aqf ++ cat /tmp/tmp.h8nfuHglC9 ++ rm /tmp/tmp.la8C7O1Aqf /tmp/tmp.h8nfuHglC9 ++ return 0 + [[ ready =~ ready ]] + echo + log 'psmdb/some-name is ready: OK' + set +o xtrace [2026-03-10T22:01:02+0000] psmdb/some-name is ready: OK + desc 'Verify data is back to the cluster' + set +o xtrace ----------------------------------------------------------------------------------- Verify data is back to the cluster ----------------------------------------------------------------------------------- + simple_data_check some-name 3 0 -rs0 + local cluster_name=some-name + let last_pod=3-1 + local isSharded=0 + local cluster_pfx=-rs0 + '[' 0 -eq 1 ']' ++ seq 0 2 + for i in $(seq 0 $last_pod) + compare_mongo_cmd find myApp:myPass@some-name-rs0-0.some-name-rs0.demand-backup-if-unhealthy-26494 + local command=find + local uri=myApp:myPass@some-name-rs0-0.some-name-rs0.demand-backup-if-unhealthy-26494 + local postfix= + local suffix= + local database=myApp + local collection=test + local sort= + local tls=false + local replicaset= + local 'full_command=db.test.find()' + [[ -n '' ]] + log 'running db.test.find() in myApp' + set +o xtrace [2026-03-10T22:01:02+0000] running db.test.find() in myApp + [[ false == \t\r\u\e ]] + mongo_command=run_mongo + run_mongo 'use myApp\n db.test.find()' myApp:myPass@some-name-rs0-0.some-name-rs0.demand-backup-if-unhealthy-26494 mongodb '' '' + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + grep -E -v 'I NETWORK|W NETWORK|F NETWORK|"c":"NETWORK"|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-rs0-0.some-name-rs0.demand-backup-if-unhealthy-26494 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@some-name-rs0-0.some-name-rs0.demand-backup-if-unhealthy-26494 == *cfg* ]] ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jsuH7ksM1Q +++ mktemp ++ local LAST_ERR=/tmp/tmp.AB15LSMVjy ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.jsuH7ksM1Q ++ cat /tmp/tmp.AB15LSMVjy ++ rm /tmp/tmp.jsuH7ksM1Q /tmp/tmp.AB15LSMVjy ++ return 0 + local client_container=psmdb-client-bb8b97679-j25ts + kubectl_bin exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-0.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.lrwi5VMJs4 ++ mktemp + local LAST_ERR=/tmp/tmp.Ca09CDdYHn + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-0.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.lrwi5VMJs4 + cat /tmp/tmp.Ca09CDdYHn + rm /tmp/tmp.lrwi5VMJs4 /tmp/tmp.Ca09CDdYHn + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/compare/find.json /tmp/tmp.gFB8zmN56Q/find + for i in $(seq 0 $last_pod) + compare_mongo_cmd find myApp:myPass@some-name-rs0-1.some-name-rs0.demand-backup-if-unhealthy-26494 + local command=find + local uri=myApp:myPass@some-name-rs0-1.some-name-rs0.demand-backup-if-unhealthy-26494 + local postfix= + local suffix= + local database=myApp + local collection=test + local sort= + local tls=false + local replicaset= + local 'full_command=db.test.find()' + [[ -n '' ]] + log 'running db.test.find() in myApp' + set +o xtrace [2026-03-10T22:01:04+0000] running db.test.find() in myApp + [[ false == \t\r\u\e ]] + mongo_command=run_mongo + run_mongo 'use myApp\n db.test.find()' myApp:myPass@some-name-rs0-1.some-name-rs0.demand-backup-if-unhealthy-26494 mongodb '' '' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-rs0-1.some-name-rs0.demand-backup-if-unhealthy-26494 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@some-name-rs0-1.some-name-rs0.demand-backup-if-unhealthy-26494 == *cfg* ]] + grep -E -v 'I NETWORK|W NETWORK|F NETWORK|"c":"NETWORK"|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fUKK3A3Rja +++ mktemp ++ local LAST_ERR=/tmp/tmp.g0bMRhUAO3 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fUKK3A3Rja ++ cat /tmp/tmp.g0bMRhUAO3 ++ rm /tmp/tmp.fUKK3A3Rja /tmp/tmp.g0bMRhUAO3 ++ return 0 + local client_container=psmdb-client-bb8b97679-j25ts + kubectl_bin exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-1.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.SU5lSbyT4x ++ mktemp + local LAST_ERR=/tmp/tmp.mkqpzeTf7X + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-1.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.SU5lSbyT4x + cat /tmp/tmp.mkqpzeTf7X + rm /tmp/tmp.SU5lSbyT4x /tmp/tmp.mkqpzeTf7X + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/compare/find.json /tmp/tmp.gFB8zmN56Q/find + for i in $(seq 0 $last_pod) + compare_mongo_cmd find myApp:myPass@some-name-rs0-2.some-name-rs0.demand-backup-if-unhealthy-26494 + local command=find + local uri=myApp:myPass@some-name-rs0-2.some-name-rs0.demand-backup-if-unhealthy-26494 + local postfix= + local suffix= + local database=myApp + local collection=test + local sort= + local tls=false + local replicaset= + local 'full_command=db.test.find()' + [[ -n '' ]] + log 'running db.test.find() in myApp' + set +o xtrace [2026-03-10T22:01:07+0000] running db.test.find() in myApp + [[ false == \t\r\u\e ]] + mongo_command=run_mongo + run_mongo 'use myApp\n db.test.find()' myApp:myPass@some-name-rs0-2.some-name-rs0.demand-backup-if-unhealthy-26494 mongodb '' '' + local 'command=use myApp\n db.test.find()' + grep -E -v 'I NETWORK|W NETWORK|F NETWORK|"c":"NETWORK"|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:|Started a new thread for the timer service' + local uri=myApp:myPass@some-name-rs0-2.some-name-rs0.demand-backup-if-unhealthy-26494 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local replica_set=rs0 + [[ myApp:myPass@some-name-rs0-2.some-name-rs0.demand-backup-if-unhealthy-26494 == *cfg* ]] + /usr/sbin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0MaffyL8W9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZUdwhxvyA5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.0MaffyL8W9 ++ cat /tmp/tmp.ZUdwhxvyA5 ++ rm /tmp/tmp.0MaffyL8W9 /tmp/tmp.ZUdwhxvyA5 ++ return 0 + local client_container=psmdb-client-bb8b97679-j25ts + kubectl_bin exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-2.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' ++ mktemp + local LAST_OUT=/tmp/tmp.YjWYShAeOa ++ mktemp + local LAST_ERR=/tmp/tmp.bGDj5QgZsp + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl exec psmdb-client-bb8b97679-j25ts -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-rs0-2.some-name-rs0.demand-backup-if-unhealthy-26494.svc.cluster.local/admin?ssl=false\&replicaSet=rs0 ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.YjWYShAeOa + cat /tmp/tmp.bGDj5QgZsp + rm /tmp/tmp.YjWYShAeOa /tmp/tmp.bGDj5QgZsp + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/e2e-tests/demand-backup-if-unhealthy/compare/find.json /tmp/tmp.gFB8zmN56Q/find + destroy demand-backup-if-unhealthy-26494 + local namespace=demand-backup-if-unhealthy-26494 + local ignore_logs=true + [[ 0 == 1 ]] + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false ']' + delete_backups + desc 'Delete psmdb-backup' + set +o xtrace ----------------------------------------------------------------------------------- Delete psmdb-backup ----------------------------------------------------------------------------------- ++ kubectl_bin get psmdb-backup --no-headers ++ wc -l +++ mktemp ++ local LAST_OUT=/tmp/tmp.f4Y9g3sSmZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.P5AtoG7rlX ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in $(seq 0 2) ++ set +e ++ kubectl get psmdb-backup --no-headers ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.f4Y9g3sSmZ ++ cat /tmp/tmp.P5AtoG7rlX ++ rm /tmp/tmp.f4Y9g3sSmZ /tmp/tmp.P5AtoG7rlX ++ return 0 + '[' 1 '!=' 0 ']' + kubectl_bin get psmdb-backup ++ mktemp + local LAST_OUT=/tmp/tmp.DlFtma9f0C ++ mktemp + local LAST_ERR=/tmp/tmp.zaYxOBYaAl + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl get psmdb-backup + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.DlFtma9f0C NAME CLUSTER STORAGE DESTINATION TYPE SIZE STATUS COMPLETED AGE backup-minio-logical some-name minio s3://operator-testing/2026-03-10T21:58:44Z logical 58.70KB ready 118s 2m28s + cat /tmp/tmp.zaYxOBYaAl + rm /tmp/tmp.DlFtma9f0C /tmp/tmp.zaYxOBYaAl + return 0 + kubectl_bin delete psmdb-backup --all ++ mktemp + local LAST_OUT=/tmp/tmp.Oq81GGaHKC ++ mktemp + local LAST_ERR=/tmp/tmp.Z3MmJIv8ws + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete psmdb-backup --all + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Oq81GGaHKC perconaservermongodbbackup.psmdb.percona.com "backup-minio-logical" deleted from demand-backup-if-unhealthy-26494 namespace + cat /tmp/tmp.Z3MmJIv8ws + rm /tmp/tmp.Oq81GGaHKC /tmp/tmp.Z3MmJIv8ws + return 0 + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.AT0C6NKtbw ++ mktemp + local LAST_ERR=/tmp/tmp.chznA97xlv + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.AT0C6NKtbw customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.chznA97xlv + rm /tmp/tmp.AT0C6NKtbw /tmp/tmp.chznA97xlv + return 0 ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/crd.yaml ++ grep -v '\-\-\-' grep: warning: stray \ before - grep: warning: stray \ before - + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.HIHeqd0xG8 ++ mktemp + local LAST_ERR=/tmp/tmp.FgKlQA5QvU + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.HIHeqd0xG8 + cat /tmp/tmp.FgKlQA5QvU + rm /tmp/tmp.HIHeqd0xG8 /tmp/tmp.FgKlQA5QvU + return 0 + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + grep -v NAMESPACE error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.Rm7FkvY0he ++ mktemp + local LAST_ERR=/tmp/tmp.HMWIc8ch6N + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Rm7FkvY0he + cat /tmp/tmp.HMWIc8ch6N + rm /tmp/tmp.Rm7FkvY0he /tmp/tmp.HMWIc8ch6N + return 0 + for crd_name in $(yq eval '.metadata.name' "${src_dir}/deploy/crd.yaml" | grep -v '\-\-\-') + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' No resources found + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: resource(s) were provided, but no name was specified + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.BycwOS2x0N ++ mktemp + local LAST_ERR=/tmp/tmp.4G0xur7AeZ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.BycwOS2x0N + cat /tmp/tmp.4G0xur7AeZ + rm /tmp/tmp.BycwOS2x0N /tmp/tmp.4G0xur7AeZ + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.peYObch3TQ ++ mktemp + local LAST_ERR=/tmp/tmp.MlsmSlBCbP + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2219/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.peYObch3TQ clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.MlsmSlBCbP + rm /tmp/tmp.peYObch3TQ /tmp/tmp.MlsmSlBCbP + return 0 + destroy_cert_manager + kubectl_bin delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.ndJj3voREb ++ mktemp + local LAST_ERR=/tmp/tmp.y8xkpihxE9 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml + exit_status=1 + set -e + '[' 1 '!=' 0 -a -n 1 ']' + cat /tmp/tmp.ndJj3voREb + cat /tmp/tmp.y8xkpihxE9 Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + sleep 0 + for i in $(seq 0 2) + set +e + kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml + exit_status=1 + set -e + '[' 1 '!=' 0 -a -n 1 ']' + cat /tmp/tmp.ndJj3voREb + cat /tmp/tmp.y8xkpihxE9 Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + sleep 4 + for i in $(seq 0 2) + set +e + kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml + exit_status=1 + set -e + '[' 1 '!=' 0 -a -n 1 ']' + cat /tmp/tmp.ndJj3voREb + cat /tmp/tmp.y8xkpihxE9 Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + sleep 8 + cat /tmp/tmp.ndJj3voREb + cat /tmp/tmp.y8xkpihxE9 Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.19.3/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + rm /tmp/tmp.ndJj3voREb /tmp/tmp.y8xkpihxE9 + return 1 + true + '[' -n '' ']' + '[' -n psmdb-operator ']' + kubectl_bin delete --grace-period=0 --force=true namespace demand-backup-if-unhealthy-26494 + rm -rf /tmp/tmp.gFB8zmN56Q + kubectl_bin delete --grace-period=0 --force=true namespace psmdb-operator ++ mktemp ++ mktemp + desc 'test passed' + set +o xtrace ----------------------------------------------------------------------------------- test passed ----------------------------------------------------------------------------------- + local LAST_OUT=/tmp/tmp.oWeJJEQi0l + local LAST_OUT=/tmp/tmp.5ntccHq1Oh ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.k6nPOUGCOK + local LAST_ERR=/tmp/tmp.92SY57fNHG + local exit_status=0 + local exit_status=0 + local timeout=4 + local timeout=4 ++ seq 0 2 ++ seq 0 2 + for i in $(seq 0 2) + set +e + kubectl delete --grace-period=0 --force=true namespace psmdb-operator + for i in $(seq 0 2) + set +e + kubectl delete --grace-period=0 --force=true namespace demand-backup-if-unhealthy-26494